US20020180584A1 - Bio-metric smart card, bio-metric smart card reader, and method of use - Google Patents

Bio-metric smart card, bio-metric smart card reader, and method of use Download PDF

Info

Publication number
US20020180584A1
US20020180584A1 US10/040,156 US4015601A US2002180584A1 US 20020180584 A1 US20020180584 A1 US 20020180584A1 US 4015601 A US4015601 A US 4015601A US 2002180584 A1 US2002180584 A1 US 2002180584A1
Authority
US
United States
Prior art keywords
key
user
transaction
smart card
security key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/040,156
Other versions
US6954133B2 (en
Inventor
Travis McGregor
Christopher McGregor
D. McGregor
Original Assignee
Audlem Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Audlem Ltd filed Critical Audlem Ltd
Priority to US10/040,156 priority Critical patent/US6954133B2/en
Priority to PCT/US2002/013262 priority patent/WO2002088931A1/en
Publication of US20020180584A1 publication Critical patent/US20020180584A1/en
Assigned to MCGREGOR, CHRISTOPHER M., MCGREGOR, D. SCOTT, McGregor, Travis M. reassignment MCGREGOR, CHRISTOPHER M. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AUDLEM LTD.
Application granted granted Critical
Publication of US6954133B2 publication Critical patent/US6954133B2/en
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0423Input/output
    • G05B19/0425Safety, monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • G06Q20/3415Cards acting autonomously as pay-media
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • G07F7/088Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
    • G07F7/0886Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/23Pc programming
    • G05B2219/23342Pluggable rom, smart card
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24162Biometric sensor, fingerprint as user access password
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24167Encryption, password, user access privileges
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/25Pc structure of the system
    • G05B2219/25192Infrared
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the present invention relates generally to the field of credit card security, and more particularly to a bio-metric smart card, a bio-metric smart card reader and a method of use for the card and reader.
  • smart cards do not address online and telephonic sales scenarios wherein the merchant lacks the ability to examine the actual card. Perhaps most importantly, since smart cards are not compatible with the existing card-reading infrastructure they do not address the near term needs of the industry and the massive on-going losses caused by fraudulent use.
  • FIG. 1 there is illustrated an available system 100 for credit card processing.
  • a credit or debit card 110 there is permanently displayed on a front face surface 112 a multi-(typically sixteen) digit number representative of the card holder's debit or credit account. Also displayed on the surface 112 are the expiration date and card holder's name.
  • a magnetic strip (not shown) is typically found on the back surface of card 110 and contains at least the information displayed on the front surface 112 .
  • a seller might use a magnetic strip reader 120 (such as available from Magtec, Inc.) by sliding the upper portion of card 110 through slot 122 to read the information stored within the magnetic strip.
  • a returned authorization number or denial message is displayed across display area 124 .
  • the user might read aloud over a telephone connection or otherwise transmit the account number, name and expiration information to a seller, who requests a transaction authorization from a central transaction authority across network 125 .
  • the present invention is a system for increasing transaction security across existing credit card processing infrastructure.
  • a user bio-metric sensor device is integrated into a credit or debit “smart card”.
  • a display unit provides a key, preferably encrypted, upon successful utilization of the sensor device. Included in the key generation mechanism is an indicator of the transaction number or other sequential count indicative of card use.
  • An authorization service decrypts the key in a manner at least partially dependent upon a second sequential count maintained in sync with the first count to determine whether the use is authorized.
  • a separate reader may be similarly configured to read existing smart cards utilizing the process the present invention.
  • the present invention may be embodied in a device for preventing the unauthorized use of proprietary data
  • the apparatus comprising, a user authentication device configured to provide the user an authentication data input for proving the user is authorized to use the account number, a transaction counting mechanism configured to track authorized device access events, a processor device in electrical communication with the user authenticator and counter, the processor being programmed to generate a security key in response to authentication data received via the user authenticator, the security key being derived at least in part from the contents of the counter, and a display unit configured to display the security key on the apparatus.
  • the present invention is a smart card style apparatus including a PIN entry system providing the user ability to enter a PIN to authenticate the user, a transaction counter for tracking authorized device access events, a processor in electrical communication with the user authenticator and counter, wherein the processor is programmed to generate a security key in response to the PIN or other authentication data, and a display unit to display the security key on the face of the card.
  • the security key is derived at least in part from the contents of the counter and a clocking mechanism.
  • the present invention is configured as a portable reader for reading and authorizing purchases using existing smart cards.
  • the present invention may also be configured as a peripheral device to a computer system.
  • the present invention is a smart card, comprising, an activation device configured to produce a signal in response to a user action, a display mechanism, a processing device coupled to the display device and configured to receive said signal, and programming executed by the processing device, said programming configured to produce an encrypted key and display the encrypted key on the display mechanism.
  • the present invention includes a system for securely processing transactions, the system comprising, a security key device, comprising, a user authenticator configured to provide a user an authentication data input for proving the user is authorized to use an account associated with the security device, a first counter in communication with the user authenticator, a key generator in communication with the user authenticator and first counter, the key generator being programmed to generate a security key in response to authentication data received via the user authenticator, the security key being derived at least in part from the content of the first counter, and an electronic display in electrical communication with the key generator, for displaying the security key in a manner visible upon the structure, and an authorization device, comprising, a second counter, and a key confirmation processor programmed to confirm an authenticity of the key in a manner at least partially dependent upon the contents of the second counter.
  • a security key device comprising, a user authenticator configured to provide a user an authentication data input for proving the user is authorized to use an account associated with the security device, a first counter in communication with the user authenticator, a
  • a method of securely authorizing a transaction utilizing an account comprises confirming an authorized use of an account card via a PIN provided by a user, maintaining a first count indicative of a number of instances of such authorized uses, generating a security key in a manner at least partially dependent upon the count, transmitting the security key to an authorizing authority, processing the security key at the authorizing authority, maintaining a second count indicative of a number of transmissions received by the authorizing authority for the account, confirming that the security key was generated by an authorized user at least in part through use of the first count and the second count, and authorizing the transaction if the security key was generated by a valid user.
  • FIG. 1 is a block diagram illustrating an available credit card and transaction processing system
  • FIG. 2 is a diagram of one embodiment of the present invention.
  • FIG. 3 is a flow-chart illustrating the operation of the present system
  • FIG. 4 is a diagram of an alternate embodiment of the present invention.
  • FIG. 5 is a diagram of an alternate embodiment of the present invention.
  • FIG. 6 is diagram illustrating the use of the present invention for purchasing goods over the Internet
  • FIG. 7 is a diagram of another embodiment of the present invention using a button for activation of an encrypted key
  • FIG. 8 is a diagram of another embodiment of the present invention having a touchpad for entry of a user PIN;
  • FIG. 9 is a flow chart illustrating operation of a touchpad embodiment of the present invention.
  • FIG. 10 is a diagram of yet another embodiment of the present invention.
  • FIG. 11 is a flow chart illustrating an example process flow of implementing data transfer according to an embodiment of the present invention.
  • FIG. 12A is a block diagram illustrating an example data flow according to an embodiment of the present invention.
  • FIG. 12B is a block diagram illustrating an example data flow according to an embodiment of the present invention.
  • FIG. 12C is a block diagram illustrating an example data flow according to an embodiment of the present invention.
  • FIG. 13 is a block diagram illustrating an example data flow and data validation according to an embodiment of the present invention.
  • FIG. 14A is an example embodiment of the present invention having a surface of the smart card coated in digital ink.
  • FIG. 14B is another example embodiment of the present invention having a surface of the smart card coated in digital ink.
  • FIG. 2 One embodiment of the present invention is illustrated in FIG. 2.
  • a bio-metric smart card 210 is shown.
  • the bio-metric smart card 210 preferably has substantially the same shape and form factor as available plastic credit and debit cards such as card 110 in FIG. 1, although card 210 might be thicker as needed to accommodate newly-introduced internal components.
  • On a front surface 212 of the card 210 in addition to the account number, name and expiration date display area, there is also preferably provided a bio-metric reading apparatus such as fingerprint scanner 218 in electrical communication with a microprocessor 216 .
  • a ROM 222 preferably an EEPROM, stores the fingerprint or other bio-metric data, the encryption keys, and a transaction counter.
  • a battery 214 is connected to provide power to microprocessor 216 , preferably within card 210 .
  • the energy needed to run microprocessor 216 might be provided through movement of card 210 (as with an automatic watch) or contact of the card or reading apparatus by the user's finger.
  • the finger print scanner 218 is accessibly disposed upon surface 212 of card 210 and connected to microprocessor 216 to provide an input signal triggered by the user placing a thumb or finger upon the surface of scanner 218 .
  • U.S. Pat. No. 5,623,552 entitled SELF-AUTHENTICATION IDENTIFICATION CARD WITH FINGERPRINT IDENTIFICATION which is incorporated herein by reference.
  • a security key display 220 is configured to display dynamic numeric and/or textual data forwarded by microprocessor 216 , and intended to accompany the account number for all transactions in the manner outlined below with reference to FIG. 3.
  • a user's bio-metric indicator here, a thumb or finger print
  • another user-derived input mechanism triggers in microprocessor 216 the generation of a dynamic security key code displayed in the security key display region 220 .
  • the display region 220 preferably comprises an LED array, LCD, or other similar, low-cost display mechanism.
  • the displayed security key is then communicated or transmitted to the credit card authorization service either through a reader, or through a telephone or other remote connection (e.g., entry by the user in a web page interface for an online transaction).
  • the security key display region 220 is configured to display dynamic numeric and/or textual data forwarded by microprocessor 216 .
  • step 302 the user places his or her thumb or finger upon fingerprint scanner 218 .
  • step 302 might be replaced with any other form of bio-metric authentication that provides positive identification that an authorized user is, in fact, attempting to use the account number found on the card.
  • the results of scan step 302 are then compared (either by scanner 218 alone or in cooperation with microprocessor 216 ) at step 304 to a reference file representative of the user's actual print.
  • the reference file might be stored in scanner 218 , in microprocessor 216 , or in a separate memory unit (ROM 222 ).
  • an error message or other message indicating an attempted use by other than the authorized user is forwarded at step 306 to display 220 .
  • the displayed error code might indicate to the user that an error has been detected with an easily discernable message such as “ERR,” or might make such a message recognizable only to the seller, bank or authorization service to better provide an opportunity to recapture a stolen card or detain an unauthorized user (e.g., a non-authentic value that looks like an authentic encrypted key).
  • the microprocessor 216 increments an activation/transaction counter at step 307 and generates therewith a numeric or alphanumeric security key.
  • the alphanumeric security key is then preferably encrypted at step 308 and forwarded at step 310 to display 220 .
  • the operator of a card reader 230 , or a remote seller communicating with the user, then inputs or forwards at step 312 the displayed, encrypted security key along with the other information found on surface 212 and any other required information.
  • an authorization-side activation counter is then incremented at step 314 , thereby remaining synchronized to the activation counter of the bio-metric smart card 210 .
  • the key is then decrypted at steps 316 in a manner utilizing the incremented activation count to determine at step 318 whether the authorized user initiated the requested purchase authorization. If the activation counter is sufficiently aligned with the counter reading from the card (within an allowed “window” of transaction counter numbers to allow for transactions being processed slightly out of order) and other easily understood criteria are met (i.e., sufficient credit or funds available, no lost or stolen card alert reported), an authorization signal is returned across network 125 at step 320 . If any of the new or available criteria are not met, a “transaction rejected” code or signal is returned at step 322 .
  • the card reader 410 preferably has substantially the same shape and form factor as available plastic credit and debit cards such as card 110 in FIG. 1, although it is generally thicker to accommodate the additional components.
  • the card reader 410 may be formed as a “wallet” such that a smart card can be inserted into the reader as shown in FIG. 4.
  • a bio-metric reading apparatus such as fingerprint scanner 418 in electrical communication with a microprocessor 416 .
  • a ROM 422 preferably an EEPROM, stores the fingerprint or other bio-metric data, the encryption keys, and a transaction counter.
  • a battery may also be connected to provide power to microprocessor 416 .
  • Finger print scanner 418 is accessibly disposed upon surface 412 of the card reader 410 and is connected to the microprocessor 416 to provide an input signal triggered by the user placing a thumb or finger upon the surface of the scanner 418 .
  • the display 420 is configured to display dynamic numeric and/or textual data forwarded by microprocessor 416 , and is intended to accompany the account number for all transactions in the manner outlined above with reference to FIG. 3.
  • the wallet may include an IR or wireless transmitter to automatically transmit the security code to a transaction network.
  • the present bio-metric reader (“wallet”) may be used with existing smart cards, which lack an incorporated microprocessor and/or display.
  • the present invention may be configured in an alternative embodiment as a traditional credit card reader 500 for attachment to a computer or point-of-sale (POS) device, such as an electronic cash register.
  • the card reader includes a microprocessor 510 , a display 512 , and a bio-metric sensor 514 . It also further includes an electrical connection 516 for transferring the security code directly from the reader 500 to the POS device or computer.
  • FIG. 6 illustrates a system for incorporating the present invention for use in purchasing goods over the Internet.
  • a merchant server 602 forwards the security key transmitted by the reader 608 to an authorization server 604 . If the authorization server 604 validates the transaction, the merchant server 602 then processes the purchase request.
  • the present invention provides a greater level of security to credit card transactions, by requiring a bio-metric input, and further by producing a unique security key code for each transaction.
  • the present invention may be incorporated into a new smart card design, including a bio-metric sensor and a display, or may be incorporated as a portable “wallet” that can also be used with standard credit cards.
  • each bio-metric smart card contains a unique cryptographic key, KCARD, which is 80 bits or 10 bytes in length.
  • KCARD unique cryptographic key
  • KDOMAIN unique key
  • KCARD left-hand 10 bytes of SHA (KDOMAIN
  • KCARD is equal to the left-hand 80 bits or 10 bytes of the appropriate SHA result.
  • BSEED is a bio-metrically generated value that is 80 bits or 10 bytes in length for each subscriber. In a preferred embodiment, the BSEED value is generated from a user's fingerprint data.
  • the Secure Hash Algorithm, SHA is defined in the Federal Information Processing Standards publications 180-1, herein incorporated by reference.
  • KDOMAIN is a random value that is set by the service provider.
  • the authentication message is encrypted data that is communicated from the bio-metric smart card to the service provider for the purpose of authenticating the subscriber and the transaction.
  • the bio-metric smart card communicates this message via the display on the front of the card, or the data is directly sent via IR or other wireless technology, or by a smart card reader that has an electrical connection to the network.
  • the authentication message is comprised of base 10 values so that it will support most current infrastructures (i.e. telephone, Internet, zone machines, etc.). This message is also cryptographically designed so that the number of digits in the message will comply with industries standards (i.e. Visa, MasterCard, Amex, AT&T, MCI, etc.).
  • the authentication message contains a transaction (serial) number that is incremented for each transaction. This transaction number is incremented for each transaction so that it will only be accepted once.
  • the transaction number is initially set to zero and when it reaches the value of 999999 the card becomes inoperable, or the transaction number is reset.
  • the bio-metric smart card increments the transaction number stored in the EEPROM of the card for each authentication message.
  • the authentication message is encrypted using the KCARD encryption key and using the MD 2 or DES encryption algorithm. This method allows for each authentication message to be unique for each subscriber and for each transaction. For example, performing MD 2 (KCARD+transaction number) produces a unique base 10 number. The next transaction increments the transaction number by 1, and thereby produces a different base 10 number, which is not simply the first security code plus one. This provides increased security against fraud, since even if someone has access to one security code, this will not authorize future transactions.
  • the authentication message is decrypted using the KCARD key and the MD 2 or DES algorithm.
  • the decryption key KCARD is generated for each transaction, so that there is no need for transferring this data.
  • the transaction number contained in the authentication message is then referenced to validate the transaction. This is to prevent duplicate transactions.
  • the authentication server may use a transaction number “window” to authorize each transaction in order to accommodate transactions being processed out of order. For example, transactions that are plus five transaction numbers from the current count may be approved.
  • the smart card or wallet incorporating the present invention must be initialized prior to use in order to store the KDOMAIN value and the user's fingerprint data. This step may be performed at a user's local bank branch, as is currently done to initialize ATM PIN numbers.
  • FIG. 7 is a diagram of another embodiment of the present invention.
  • a button or other activation device 700 is placed on a smart card 710 .
  • the smart card 710 contains components similar to the bio-metric smart card 210 , including a microprocessor, 716 , battery 714 , ROM 722 , and display 720 . Also similar to the bio-metric smart card, other arrangements of these components may also be utilized.
  • the battery 214 provides an energy source for operation of the microprocessor 216 . Alternatively, a solar or light sensitive panel provides the energy source.
  • the button or other activation device 700 provides a signal that initiates production of an encrypted key that is displayed on display 720 .
  • the button 700 may be a physical button having contacts, a pressure sensitive or light sensitive switch, a heat sensitive button, or another activation device.
  • the display 720 may be an LCD device (including displays similar to palm-type computers, but adjusted for size to fit the credit card like dimensions of the smart card 710 ).
  • the ROM 222 contains programming or other data executed/used by the microprocessor to calculate the encrypted key to be displayed.
  • the programming stored in ROM 722 is executed on the microprocessor 716 (In one alternative, the programming is hardwired into other electronics of the smart card).
  • the microprocessor receives the initiation signal from the button 700 , calculates the encrypted key, and then displays the encrypted key on display 720 .
  • FIG. 8 is a diagram of another embodiment of the present invention.
  • a touchpad 800 is provided for entry of a user PIN.
  • the touchpad is a 10 key type touch pad having buttons for digits 0-1, and a delete button 810 .
  • the touchpad might also contain alpha numerals in various forms including telephone style numerals, shift key and shift key activate numerals, or a full keyboard.
  • the touchpad may be constructed of a set of heat or pressure sensitive switches or other devices. The touch pad may be activated by finger touching the corresponding keys of the user's pin, or, via a stylus device.
  • both the display and keypad are consolidated on a single touch sensitive screen that has facilities for inputting numerals, alpha, and/or other characters consistent with a user's PIN (including, but not limited to symbols, punctuation, and/or foreign language alpha and characters).
  • Handwriting recognition or a displayed keyboard similar to those found on Palm and Handspring devices may be utilized to input the user's PIN.
  • Additional programming stored in ROM 822 and executed on Microprocessor 816 may be utilized to facilitate entry of the PIN. The additional programming may alternatively be embedded in the microprocessor or other electronics of the smart card.
  • the encrypted key is produced upon entry of the user's PIN to the smart card.
  • FIG. 9 is a flow chart illustrating operation of a touchpad embodiment of the present invention.
  • the microprocessor e.g. microprocessor 716 / 1016
  • receives a user's PIN that had been entered by the user e.g., via touchpad 800 .
  • the entered PIN is then compared, at step 904 , against a stored PIN (e.g., stored in ROM 822 ) to determine is a match has occurred.
  • a stored PIN e.g., stored in ROM 822
  • an error message or other message indicating an attempted use by other than the authorized user is forwarded at step 906 to the display.
  • the displayed message e.g., an error code
  • ERR easily discernable message
  • the microprocessor increments an activation/transaction counter at step 907 and generates therewith a numeric or alphanumeric security key.
  • the alphanumeric security key is then preferably encrypted at step 908 and forwarded at step 910 to the display.
  • the operator of a card reader 230 , or a remote seller communicating with the user then inputs or forwards at step 912 the displayed, encrypted security key along with the other information found on the surface of the smart card and/or any other required information.
  • an authorization-side activation counter is then incremented at step 914 , thereby remaining synchronized to an activation counter of the smart card.
  • the key is then decrypted at steps 916 in a manner utilizing the incremented activation count to determine at step 918 whether the authorized user initiated the requested purchase authorization. If the activation counter is sufficiently aligned with the counter reading from the card (within an allowed “window” of transaction counter numbers to allow for transactions being processed slightly out of order) and other easily understood criteria are met (i.e., sufficient credit or funds available, no lost or stolen card alert reported), an authorization signal is returned across network 125 at step 920 . If any of the new or available criteria are not met, a “transaction rejected” code or signal is returned at step 922 .
  • the smart card uses both a bio-metric reading apparatus and a touchpad for entry of the user's PIN. Steps 902 and 904 , and Steps 302 and 304 are each executed before performing other steps related to production/determination of the encrypted key.
  • FIG. 10 is a diagram of yet another embodiment of the present invention formed in conjunction with an alternative device.
  • the present invention is embedded and placed upon an alternative device, a wallet, 1010 .
  • the wallet 1010 preferably has substantially the same shape and form factor as available plastic credit and debit cards such as card 110 in FIG. 1, although it is generally thicker to accommodate the additional components.
  • a smart card, credit card, or other device 1028 may be fitted and held inside the wallet 1010 .
  • On the front surface 1012 there is provided a touchpad 1018 for entry of a user's PIN (or alternatively, both a touchpad and bio-metric sensing device).
  • the touchpad and/or bio-metric sensing device is in electrical communication with a microprocessor 1016 .
  • a ROM 1022 preferably an EEPROM, stores at least one of the fingerprint or other bio-metric data, the encryption keys, a transaction counter, and a user's PIN, as required to test inputs (either bio-metric or PINs) and produce an encrypted key.
  • a battery 1024 may also be connected to provide power to microprocessor 1016 . Again, the power may be provided through movement, solar cells, or other energy sources.
  • the card reader includes a display 1020 .
  • the wallet 1010 includes an IR or other wireless transmitter to automatically transmit the security code to a transaction network.
  • the present bio-metric reader (“wallet”) may be used with existing smart cards, which lack an incorporated microprocessor and/or display.
  • a clocking mechanism 1100 is coupled to the microprocessor (e.g., microprocessor 716 ).
  • the clocking mechanism (preferably internal to the smart card, e.g. smart card 710 ) continually generates a clock authorization number.
  • Programming executed on the microprocessor uses the clock authorization number in production of the encrypted key.
  • On the Card Authorization Server (CAS) (e.g., CAS 604 , back end server, etc.), another clocking mechanism 1150 (See FIG. 6) is synched to the clocking mechanism 1100 , and, an output of the synched clocking mechanism 1150 is used to decrypt the encrypted key.
  • CAS Card Authorization Server
  • the decrypted key is then examined to verify that a proper transaction has been initiated.
  • the clocking mechanisms are clocks based on current time, and the clock authorization number is a value produced via an algorithm using the time and a clock authorization key.
  • the clocking mechanisms are unrelated to the current time, but progressively changes values in at least one direction (for example, any combination of count-up, count-down devices, or other time varying devices), and preferably encrypted with the clock authorization key.
  • Use of internal clocks in producing the key, and hence the encrypted key, on both the device (e.g. smart card) and back end (e.g. CAS server) may be utilized in any of the other embodiments discussed further above.
  • the present inventors have realized that the present invention may integrated into existing credit card approval infrastructure.
  • Most credit card approval systems today include a card reader (e.g. reader 120 ) which includes a keypad.
  • Software operating the reader generally already has facilities for entry of a PIN, particularly for ATM card transactions that require a PIN.
  • the present invention may be integrated into the existing infrastructure by using the existing software and prompts for collection of ATM PINs for collection and transfer of the encrypted key to a clearing house or other financial institution that approves use of the credit card. Transfer of the encrypted key is performed via a transaction communication in which the encrypted key is passed to the authorizing authority in the PIN field. Other data may also be communicated in the transaction communication.
  • FIG. 11 is a flow chart illustrating an example process flow of implementing data transfer according to an embodiment of the present invention.
  • the user swipes a credit card or otherwise enters the credit card number into a card reader, web page, or other device that captures the user's credit card number.
  • the user initiates production of the encrypted key.
  • the encrypted key is initiated according to any of the embodiments discussed above, pressing a button, entering a user PIN, or generated according to another triggering event (e.g., reading the card).
  • the user also enters the encrypted key into the reader when prompted.
  • the prompt may simply be to enter the user's PIN, to which the user responds by entering the encrypted key generated by the smart card (not the user's PIN, which, in the previously discussed embodiments is required for production of the encrypted key).
  • entry of the encrypted key is entry of the user's PIN for the transaction being processed.
  • the users card number and encrypted key may be entered into the system via other procedures.
  • the user initiates production of the encrypted key.
  • the user swipes his card into the card reader which then reads both the card number and encrypted key.
  • the alternative procedures may not fit as easily into the existing infrastructures and may require some reprogramming of current readers.
  • the encrypted key is entered into the system and placed in the existing PIN field of the data transaction between the card reader (e.g. retailer) and the first clearing house in the credit card transaction approval chain.
  • the users card number and encrypted key, along with other necessary information are then sent via a transaction communication to a clearing house or other financial institution for processing (Step 1115 ).
  • a return message from the financial institution/clearing house indicates whether the transaction is approved (i.e., the account is in good standing and the encrypted key matches). If approved, an accept message is sent to the retailer (step 1130 ), if declined, the disapproval is sent to the retailer (step 1125 ).
  • FIG. 12A is a block diagram illustrating an example data flow according to an embodiment of the present invention.
  • FIG. 12A presents an example credit card transaction approval chain.
  • the card number (card #) 1205 and other transaction data (price, etc) and the encrypted key (preferably placed in the PIN field) 1210 are sent to a primary clearing house.
  • the primary clearing house is the first financial institution in the credit card transaction clearing house chain.
  • the combined fields 1205 and 1210 comprise a transaction communication and may be a single message or multiple messages containing information needed to complete a transaction.
  • the primary clearing house checks the transaction like a normal credit card transaction and passes all the data (e.g. 1205 / 1210 , now 1225 / 1230 ) to a middle clearing house 1240 .
  • the middle clearing house 1240 represents all the intermediary financial institutions between the primary clearing house and the banks or backing institution 1260 of the credit card (smart card).
  • the middle clearing house also passes all the data on to the bank 1260 .
  • the bank 1260 then checks the account status, decrypts the encrypted key, and sends a status message 1255 back through the credit card transaction approval chain. If the account and key check out ok, the status message is an accept. If not, the status message is a decline.
  • the bank 1260 performs the primary financial and account checking to verify and approve the transaction.
  • any of the primary and middle clearing houses may also perform similar functions. If this occurs, then the data flow through the credit card transaction approval chain may be modified accordingly.
  • the middle clearing house 1240 decrypts the encrypted key and checks it for validity. The credit card number is still passed on to the bank 1260 for account validation.
  • the primary clearing house decrypts the encrypted key and checks it for validity. The credit card number is still passed on to the middle clearing house and bank 1260 for account validation. Any number of variations of checking and approval may be implemented once the card number, other transaction data, and the encrypted key are entered into the data communications representing the transaction to be approved.
  • FIG. 13 is a block diagram illustrating an example data flow and data validation according to an embodiment of the present invention.
  • a primary clearing house 1221 receives the card # and other transaction data 1205 and an encrypted key packed in a PIN field.
  • the clearing house sends the card number to an authorization device 1300 that include authorization server 604 .
  • the authorization server 604 uses the card number to reference any needed user data 1310 , retrieves a clock signal (if needed for the particular embodiment), decrypts the encrypted key, and determines if it is valid. If the decrypted key is valid, and an accept status signal 1235 is received from the subsequent institution (e.g., bank, credit union, etc.), then the clearing house 1221 forward an accept status 1215 . If either the decrypted key is invalid, or a decline is received in status 1235 , the clearing house forwards a decline in status message 1215 .
  • the subsequent institution e.g., bank, credit union, etc.
  • the smart card of the present invention is produced on an Electronic Ink surface such as a Thin and Flexible Microelectronics (TFM) substrate.
  • Example surfaces are produced by Power PaperTM.
  • each microcapsule contains positively charged white particles and negatively charged black particles suspended in a clear fluid.
  • a negative electric field is applied, the white particles move to the top of the microcapsule where they become visible to the user. This makes the surface appear white at that spot.
  • an opposite electric field pulls the black particles to the bottom of the microcapsules where they are hidden. By reversing this process, the black particles appear at the top of the capsule, which now makes the surface appear dark at that spot.
  • the ink is printed onto a sheet of plastic film that is laminated to a layer of circuitry.
  • the circuitry forms a pattern of pixels that can then be controlled by a display driver. These microcapsules are suspended in a liquid “carrier medium” allowing them to be printed using existing screen printing processes onto virtually any surface, including glass, plastic, fabric and even paper.
  • microprocessor 716 (or other electronics connected thereto) include drivers that charge the electronic circuitry that to form the pattern of pixels for the display on the smart card 710 or smart card wallet 1010 .
  • the LCD display 720 , 820 , and 1020 is replaced with an electronic ink surface. Any display imaginable may be produced. Some example displays include those presented previously, and alternatives may include those shown in FIGS. 14A and 14B. Each of FIGS.
  • a card number space 1400 is provided.
  • a logo space 1410 is provided, and programming of the microprocessor and/or display drivers produces a logo of the card or backing financial institution displayed in the logo space 1410 .
  • a keypad including digits 1-9, 0, clear, and enter are provided in digital ink.
  • Underlying electronics, including any of heat sensitive, pressure sensitive, or mechanical activation switches are provided to register user inputs on the key pad.
  • logo space 1430 is a digital ink representation of the credit card company, and expiration date/user information is provided in space 1440 .
  • Portions of the present invention may be conveniently implemented using a conventional general purpose or a specialized digital computer or microprocessor programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art.
  • that computer is embodied in a microprocessor embedded in a wallet or smart card device.
  • the present invention includes a computer program product which is a storage medium (media) having instructions stored thereon/in which can be used to control, or cause, a computer to perform any of the processes of the present invention.
  • the storage medium can include, but is not limited to, any type of disk including floppy disks, mini disks (MD's), optical discs, DVD, CD-ROMS, micro-drive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices (including flash cards), magnetic or optical cards, nanosystems (including molecular memory ICs), RAID devices, remote data storage/archive/warehousing, or any type of media or device suitable for storing instructions and/or data.
  • the present invention includes software for controlling both the hardware of the general purpose/specialized computer or microprocessor, and for enabling the computer or microprocessor to interact with a human user or other mechanism utilizing the results of the present invention.
  • software may include, but is not limited to, device drivers, operating systems, and user applications.
  • computer readable media further includes software for performing the present invention, as described above.

Abstract

A system for increasing transaction security across existing infrastructure is provided. An activation mechanism sends an activation signal or a signal providing a PIN and/or other data to a processing device. If the data is verifiable, the processing device performs verification. A display unit provides a key, preferably encrypted, upon successful utilization of the sensor device. Included in the key generation mechanism is an indicator of the transaction number or other sequential count indicative of card use. An authorization service reads the key from a transaction communication PIN field and decrypts based on a second sequential count maintained in sync with the first count to determine whether the use is authorized. In one embodiment a clocking mechanism is also utilized in encrypting and decrypting the key. A separate reader may be similarly configured to read existing smart cards utilizing the process of the present invention.

Description

    CROSS REFERENCE TO A RELATED APPLICATION AND CLAIM OF PRIORITY
  • This invention is a continuation in part and claims priority to the following co-pending U.S. patent application, which is incorporated herein by reference in its entirety: [0001]
  • McGregor et al, application Ser. No. 09/843,572, entitled “A BIO-METRIC SMART CARD, BIO-METRIC SMART CARD READER, AND METHOD OF USE,” attorney docket no. 2375 8.001 00, filed, Apr. 26, 2001.[0002]
  • BACKGROUND OF THE INVENTION COPYRIGHT NOTICE
  • A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. [0003]
  • 1. Field of the Invention [0004]
  • The present invention relates generally to the field of credit card security, and more particularly to a bio-metric smart card, a bio-metric smart card reader and a method of use for the card and reader. [0005]
  • 2. Description of the Related Art [0006]
  • Recent innovations have brought significant security-related advances to the credit card, debit card, and consumer banking industries. In the 1980s, holographic images were introduced and included on plastic card faces to deter the manufacture of counterfeit cards. More recently, some cards have been adapted to include a photograph of the authorized user, thereby obviating the need for a purchaser to present separate identification and decreasing the likelihood of fraud. Most recently, smart cards, also known as personal data cards or chip cards, which include a memory chip integral with the card, now provide additional security features. [0007]
  • Despite these advances, the industry remains burdened by a considerable fraud problem. Credit card theft and fraud accounts for billions of dollars in damages a year in the U.S. alone, with billions more being lost overseas. Holographic images do nothing to deter the unauthorized use of a genuine card and new technology has made them easier to copy. Sub-thumbnail sized photos on cards are often too small for careful examination by store clerks, and like holograms, cannot be viewed during online or telephone-based transactions. And smart cards provide no new security features unless used across a new breed of card-reading infrastructure, which will cost hundreds of millions of dollars to install. Moreover, like the other new technologies described above, smart cards do not address online and telephonic sales scenarios wherein the merchant lacks the ability to examine the actual card. Perhaps most importantly, since smart cards are not compatible with the existing card-reading infrastructure they do not address the near term needs of the industry and the massive on-going losses caused by fraudulent use. [0008]
  • Referring to FIG. 1, there is illustrated an available system [0009] 100 for credit card processing. On a credit or debit card 110 there is permanently displayed on a front face surface 112 a multi-(typically sixteen) digit number representative of the card holder's debit or credit account. Also displayed on the surface 112 are the expiration date and card holder's name. A magnetic strip (not shown) is typically found on the back surface of card 110 and contains at least the information displayed on the front surface 112. To process a transaction using the card 110, a seller might use a magnetic strip reader 120 (such as available from Magtec, Inc.) by sliding the upper portion of card 110 through slot 122 to read the information stored within the magnetic strip. After the information is forwarded across network 125 to a financial institution or credit card authorization service, along with data about the requested transaction, a returned authorization number or denial message is displayed across display area 124. In the alternative, the user might read aloud over a telephone connection or otherwise transmit the account number, name and expiration information to a seller, who requests a transaction authorization from a central transaction authority across network 125.
  • In the above-described available transaction process, while recent security advances do provide some crime protection, there is still far more opportunity than desirable for deception and fraud. Specifically, if the card is lost or stolen the thief or finder of the lost card might use the card for fraudulent purchases. Also, if a thief finds or steals a receipt or similar record listing the card number and other card information found in field [0010] 112, that information might be fraudulently used for online or telephonic transactions.
  • There is therefore a need in the art for a new fraud-preventive system and method, which is compatible with the existing infrastructure, and can be used securely for remote, telephonic, or Internet-based transactions. [0011]
  • SUMMARY OF THE INVENTION
  • In general, the present invention is a system for increasing transaction security across existing credit card processing infrastructure. A user bio-metric sensor device is integrated into a credit or debit “smart card”. A display unit provides a key, preferably encrypted, upon successful utilization of the sensor device. Included in the key generation mechanism is an indicator of the transaction number or other sequential count indicative of card use. An authorization service decrypts the key in a manner at least partially dependent upon a second sequential count maintained in sync with the first count to determine whether the use is authorized. A separate reader may be similarly configured to read existing smart cards utilizing the process the present invention. [0012]
  • More specifically, the present invention may be embodied in a device for preventing the unauthorized use of proprietary data, the apparatus comprising, a user authentication device configured to provide the user an authentication data input for proving the user is authorized to use the account number, a transaction counting mechanism configured to track authorized device access events, a processor device in electrical communication with the user authenticator and counter, the processor being programmed to generate a security key in response to authentication data received via the user authenticator, the security key being derived at least in part from the contents of the counter, and a display unit configured to display the security key on the apparatus. [0013]
  • In one embodiment, the present invention is a smart card style apparatus including a PIN entry system providing the user ability to enter a PIN to authenticate the user, a transaction counter for tracking authorized device access events, a processor in electrical communication with the user authenticator and counter, wherein the processor is programmed to generate a security key in response to the PIN or other authentication data, and a display unit to display the security key on the face of the card. The security key is derived at least in part from the contents of the counter and a clocking mechanism. In another embodiment, the present invention is configured as a portable reader for reading and authorizing purchases using existing smart cards. The present invention may also be configured as a peripheral device to a computer system. [0014]
  • In another embodiment, the present invention is a smart card, comprising, an activation device configured to produce a signal in response to a user action, a display mechanism, a processing device coupled to the display device and configured to receive said signal, and programming executed by the processing device, said programming configured to produce an encrypted key and display the encrypted key on the display mechanism. [0015]
  • The present invention includes a system for securely processing transactions, the system comprising, a security key device, comprising, a user authenticator configured to provide a user an authentication data input for proving the user is authorized to use an account associated with the security device, a first counter in communication with the user authenticator, a key generator in communication with the user authenticator and first counter, the key generator being programmed to generate a security key in response to authentication data received via the user authenticator, the security key being derived at least in part from the content of the first counter, and an electronic display in electrical communication with the key generator, for displaying the security key in a manner visible upon the structure, and an authorization device, comprising, a second counter, and a key confirmation processor programmed to confirm an authenticity of the key in a manner at least partially dependent upon the contents of the second counter. [0016]
  • According to the present invention, a method of securely authorizing a transaction utilizing an account comprises confirming an authorized use of an account card via a PIN provided by a user, maintaining a first count indicative of a number of instances of such authorized uses, generating a security key in a manner at least partially dependent upon the count, transmitting the security key to an authorizing authority, processing the security key at the authorizing authority, maintaining a second count indicative of a number of transmissions received by the authorizing authority for the account, confirming that the security key was generated by an authorized user at least in part through use of the first count and the second count, and authorizing the transaction if the security key was generated by a valid user.[0017]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention will be readily understood by the following detailed description in conjunction with the accompanying drawings, wherein like reference numerals designate like structural elements, and in which: [0018]
  • FIG. 1 is a block diagram illustrating an available credit card and transaction processing system; [0019]
  • FIG. 2 is a diagram of one embodiment of the present invention; [0020]
  • FIG. 3 is a flow-chart illustrating the operation of the present system; [0021]
  • FIG. 4 is a diagram of an alternate embodiment of the present invention; [0022]
  • FIG. 5 is a diagram of an alternate embodiment of the present invention; [0023]
  • FIG. 6 is diagram illustrating the use of the present invention for purchasing goods over the Internet; [0024]
  • FIG. 7 is a diagram of another embodiment of the present invention using a button for activation of an encrypted key; [0025]
  • FIG. 8 is a diagram of another embodiment of the present invention having a touchpad for entry of a user PIN; [0026]
  • FIG. 9 is a flow chart illustrating operation of a touchpad embodiment of the present invention; [0027]
  • FIG. 10 is a diagram of yet another embodiment of the present invention; [0028]
  • FIG. 11 is a flow chart illustrating an example process flow of implementing data transfer according to an embodiment of the present invention; [0029]
  • FIG. 12A is a block diagram illustrating an example data flow according to an embodiment of the present invention; [0030]
  • FIG. 12B is a block diagram illustrating an example data flow according to an embodiment of the present invention; [0031]
  • FIG. 12C is a block diagram illustrating an example data flow according to an embodiment of the present invention; [0032]
  • FIG. 13 is a block diagram illustrating an example data flow and data validation according to an embodiment of the present invention; [0033]
  • FIG. 14A is an example embodiment of the present invention having a surface of the smart card coated in digital ink; and [0034]
  • FIG. 14B is another example embodiment of the present invention having a surface of the smart card coated in digital ink.[0035]
  • DETAILED DESCRIPTION OF THE INVENTION
  • The following description is provided to enable any person skilled in the art to make and use the invention and sets forth the best modes contemplated by the inventor for carrying out the invention. Various modifications, however, will remain readily apparent to those skilled in the art, since the basic principles of the present invention have been defined herein specifically to provide a bio-metric smart card, bio-metric smart card reader and method of use. Any and all such modifications, equivalents and alternatives are intended to fall within the spirit and scope of the present invention. [0036]
  • One embodiment of the present invention is illustrated in FIG. 2. In this embodiment a bio-metric [0037] smart card 210 is shown. The bio-metric smart card 210 preferably has substantially the same shape and form factor as available plastic credit and debit cards such as card 110 in FIG. 1, although card 210 might be thicker as needed to accommodate newly-introduced internal components. On a front surface 212 of the card 210, in addition to the account number, name and expiration date display area, there is also preferably provided a bio-metric reading apparatus such as fingerprint scanner 218 in electrical communication with a microprocessor 216. A ROM 222, preferably an EEPROM, stores the fingerprint or other bio-metric data, the encryption keys, and a transaction counter. A battery 214 is connected to provide power to microprocessor 216, preferably within card 210. In the alternative, the energy needed to run microprocessor 216 might be provided through movement of card 210 (as with an automatic watch) or contact of the card or reading apparatus by the user's finger. The finger print scanner 218 is accessibly disposed upon surface 212 of card 210 and connected to microprocessor 216 to provide an input signal triggered by the user placing a thumb or finger upon the surface of scanner 218. For additional information on available technology compatible with the intended use of scanner 218, the reader is referred to U.S. Pat. No. 5,623,552, entitled SELF-AUTHENTICATION IDENTIFICATION CARD WITH FINGERPRINT IDENTIFICATION which is incorporated herein by reference.
  • A security [0038] key display 220 is configured to display dynamic numeric and/or textual data forwarded by microprocessor 216, and intended to accompany the account number for all transactions in the manner outlined below with reference to FIG. 3.
  • In a manner of use of the bio-metric [0039] smart card 210 and the present invention, a user's bio-metric indicator (here, a thumb or finger print) or another user-derived input mechanism triggers in microprocessor 216 the generation of a dynamic security key code displayed in the security key display region 220. The display region 220 preferably comprises an LED array, LCD, or other similar, low-cost display mechanism. The displayed security key is then communicated or transmitted to the credit card authorization service either through a reader, or through a telephone or other remote connection (e.g., entry by the user in a web page interface for an online transaction). The security key display region 220 is configured to display dynamic numeric and/or textual data forwarded by microprocessor 216.
  • More particularly, referring generally to the flowchart of FIG. 3, at [0040] step 302 the user places his or her thumb or finger upon fingerprint scanner 218. In the alternative, step 302 might be replaced with any other form of bio-metric authentication that provides positive identification that an authorized user is, in fact, attempting to use the account number found on the card. The results of scan step 302 are then compared (either by scanner 218 alone or in cooperation with microprocessor 216) at step 304 to a reference file representative of the user's actual print. The reference file might be stored in scanner 218, in microprocessor 216, or in a separate memory unit (ROM 222). If no match is found, an error message or other message indicating an attempted use by other than the authorized user is forwarded at step 306 to display 220. The displayed error code might indicate to the user that an error has been detected with an easily discernable message such as “ERR,” or might make such a message recognizable only to the seller, bank or authorization service to better provide an opportunity to recapture a stolen card or detain an unauthorized user (e.g., a non-authentic value that looks like an authentic encrypted key).
  • If a match is found at [0041] step 304, the microprocessor 216 increments an activation/transaction counter at step 307 and generates therewith a numeric or alphanumeric security key. The alphanumeric security key is then preferably encrypted at step 308 and forwarded at step 310 to display 220. The operator of a card reader 230, or a remote seller communicating with the user, then inputs or forwards at step 312 the displayed, encrypted security key along with the other information found on surface 212 and any other required information.
  • Upon receipt of the card information and encrypted key at an authorization service center, an authorization-side activation counter is then incremented at [0042] step 314, thereby remaining synchronized to the activation counter of the bio-metric smart card 210. The key is then decrypted at steps 316 in a manner utilizing the incremented activation count to determine at step 318 whether the authorized user initiated the requested purchase authorization. If the activation counter is sufficiently aligned with the counter reading from the card (within an allowed “window” of transaction counter numbers to allow for transactions being processed slightly out of order) and other easily understood criteria are met (i.e., sufficient credit or funds available, no lost or stolen card alert reported), an authorization signal is returned across network 125 at step 320. If any of the new or available criteria are not met, a “transaction rejected” code or signal is returned at step 322.
  • Referring next to FIG. 4, one embodiment of the [0043] inventive card reader 410 is illustrated. The card reader 410 preferably has substantially the same shape and form factor as available plastic credit and debit cards such as card 110 in FIG. 1, although it is generally thicker to accommodate the additional components. The card reader 410 may be formed as a “wallet” such that a smart card can be inserted into the reader as shown in FIG. 4. On the front surface 412, there is preferably provided a bio-metric reading apparatus such as fingerprint scanner 418 in electrical communication with a microprocessor 416. A ROM 422, preferably an EEPROM, stores the fingerprint or other bio-metric data, the encryption keys, and a transaction counter. A battery may also be connected to provide power to microprocessor 416. In the alternative, the energy needed to run microprocessor 416 might be provided through movement of card reader 410 (as with an automatic watch) or contact of the card or by a solar panel. The card reader 410 further includes an alpha-numeric display, such as an LED or LCD display 420.
  • [0044] Finger print scanner 418 is accessibly disposed upon surface 412 of the card reader 410 and is connected to the microprocessor 416 to provide an input signal triggered by the user placing a thumb or finger upon the surface of the scanner 418. The display 420 is configured to display dynamic numeric and/or textual data forwarded by microprocessor 416, and is intended to accompany the account number for all transactions in the manner outlined above with reference to FIG. 3. The wallet may include an IR or wireless transmitter to automatically transmit the security code to a transaction network. Thus, the present bio-metric reader (“wallet”) may be used with existing smart cards, which lack an incorporated microprocessor and/or display.
  • As shown in FIG. 5, the present invention may be configured in an alternative embodiment as a traditional [0045] credit card reader 500 for attachment to a computer or point-of-sale (POS) device, such as an electronic cash register. The card reader includes a microprocessor 510, a display 512, and a bio-metric sensor 514. It also further includes an electrical connection 516 for transferring the security code directly from the reader 500 to the POS device or computer.
  • In operation, a user inserts a credit card or smart card into the reader. Once the user places an appropriate finger or thumb on the finger-[0046] print sensor 514, the security code is generated by the microprocessor 520 and is displayed on the card reader display 512 or electronically transferred to a network. This security code may then be used to authorize a transaction as described above. FIG. 6 illustrates a system for incorporating the present invention for use in purchasing goods over the Internet. A merchant server 602 forwards the security key transmitted by the reader 608 to an authorization server 604. If the authorization server 604 validates the transaction, the merchant server 602 then processes the purchase request.
  • As described herein, the present invention provides a greater level of security to credit card transactions, by requiring a bio-metric input, and further by producing a unique security key code for each transaction. The present invention may be incorporated into a new smart card design, including a bio-metric sensor and a display, or may be incorporated as a portable “wallet” that can also be used with standard credit cards. [0047]
  • A preferred method to perform the operation of the encryption and decryption processing will now be discussed in further detail. Other procedures or algorithms may also be used in the present invention, as in well known in the art. First, the following acronyms will be defined: [0048]
    KCARD Cryptographic key embedded into the bio-metric smart card
    KDOMAIN Cryptographic key that resides at the domain company
    SHA Secure Hash Algorithm
    BSEED Bio-metric encryption seed
    MD2 Message Digest Algorithm
    DES Data Encryption Standard
  • As described above, the purpose of the bio-metric smart card is to authenticate the subscriber and the transaction for a credit card purchase. In order to perform the authentication, each bio-metric smart card contains a unique cryptographic key, KCARD, which is 80 bits or 10 bytes in length. Each service provider also has a unique key, KDOMAIN, which is 80 bits or 10 bytes. [0049]
  • KCARD is derived cryptographically from KDOMAIN respectively as follows: [0050]
  • KCARD=left-[0051] hand 10 bytes of SHA (KDOMAIN||BSEED)
  • where as KCARD is equal to the left-hand 80 bits or 10 bytes of the appropriate SHA result. BSEED is a bio-metrically generated value that is 80 bits or 10 bytes in length for each subscriber. In a preferred embodiment, the BSEED value is generated from a user's fingerprint data. The Secure Hash Algorithm, SHA, is defined in the Federal Information Processing Standards publications 180-1, herein incorporated by reference. KDOMAIN is a random value that is set by the service provider. [0052]
  • The authentication message is encrypted data that is communicated from the bio-metric smart card to the service provider for the purpose of authenticating the subscriber and the transaction. The bio-metric smart card communicates this message via the display on the front of the card, or the data is directly sent via IR or other wireless technology, or by a smart card reader that has an electrical connection to the network. The authentication message is comprised of [0053] base 10 values so that it will support most current infrastructures (i.e. telephone, Internet, zone machines, etc.). This message is also cryptographically designed so that the number of digits in the message will comply with industries standards (i.e. Visa, MasterCard, Amex, AT&T, MCI, etc.).
  • As discussed above, the authentication message contains a transaction (serial) number that is incremented for each transaction. This transaction number is incremented for each transaction so that it will only be accepted once. The transaction number is initially set to zero and when it reaches the value of 999999 the card becomes inoperable, or the transaction number is reset. [0054]
  • The bio-metric smart card increments the transaction number stored in the EEPROM of the card for each authentication message. The authentication message is encrypted using the KCARD encryption key and using the MD[0055] 2 or DES encryption algorithm. This method allows for each authentication message to be unique for each subscriber and for each transaction. For example, performing MD2(KCARD+transaction number) produces a unique base 10 number. The next transaction increments the transaction number by 1, and thereby produces a different base 10 number, which is not simply the first security code plus one. This provides increased security against fraud, since even if someone has access to one security code, this will not authorize future transactions.
  • The authentication message is decrypted using the KCARD key and the MD[0056] 2 or DES algorithm. The decryption key KCARD is generated for each transaction, so that there is no need for transferring this data. The transaction number contained in the authentication message is then referenced to validate the transaction. This is to prevent duplicate transactions. The authentication server may use a transaction number “window” to authorize each transaction in order to accommodate transactions being processed out of order. For example, transactions that are plus five transaction numbers from the current count may be approved.
  • The smart card or wallet incorporating the present invention must be initialized prior to use in order to store the KDOMAIN value and the user's fingerprint data. This step may be performed at a user's local bank branch, as is currently done to initialize ATM PIN numbers. [0057]
  • FIG. 7 is a diagram of another embodiment of the present invention. In this embodiment, a button or [0058] other activation device 700 is placed on a smart card 710. The smart card 710 contains components similar to the bio-metric smart card 210, including a microprocessor, 716, battery 714, ROM 722, and display 720. Also similar to the bio-metric smart card, other arrangements of these components may also be utilized. The battery 214 provides an energy source for operation of the microprocessor 216. Alternatively, a solar or light sensitive panel provides the energy source.
  • The button or [0059] other activation device 700 provides a signal that initiates production of an encrypted key that is displayed on display 720. The button 700 may be a physical button having contacts, a pressure sensitive or light sensitive switch, a heat sensitive button, or another activation device. The display 720 may be an LCD device (including displays similar to palm-type computers, but adjusted for size to fit the credit card like dimensions of the smart card 710). The ROM 222 contains programming or other data executed/used by the microprocessor to calculate the encrypted key to be displayed. The programming stored in ROM 722 is executed on the microprocessor 716 (In one alternative, the programming is hardwired into other electronics of the smart card). The microprocessor receives the initiation signal from the button 700, calculates the encrypted key, and then displays the encrypted key on display 720.
  • FIG. 8 is a diagram of another embodiment of the present invention. In FIG. 8, a [0060] touchpad 800 is provided for entry of a user PIN. The touchpad is a 10 key type touch pad having buttons for digits 0-1, and a delete button 810. Alternatively, the touchpad might also contain alpha numerals in various forms including telephone style numerals, shift key and shift key activate numerals, or a full keyboard. The touchpad may be constructed of a set of heat or pressure sensitive switches or other devices. The touch pad may be activated by finger touching the corresponding keys of the user's pin, or, via a stylus device.
  • In one alternative, both the display and keypad are consolidated on a single touch sensitive screen that has facilities for inputting numerals, alpha, and/or other characters consistent with a user's PIN (including, but not limited to symbols, punctuation, and/or foreign language alpha and characters). Handwriting recognition or a displayed keyboard similar to those found on Palm and Handspring devices may be utilized to input the user's PIN. Additional programming stored in [0061] ROM 822 and executed on Microprocessor 816 may be utilized to facilitate entry of the PIN. The additional programming may alternatively be embedded in the microprocessor or other electronics of the smart card.
  • In the embodiment of FIG. 8, the encrypted key is produced upon entry of the user's PIN to the smart card. [0062]
  • FIG. 9 is a flow chart illustrating operation of a touchpad embodiment of the present invention. At [0063] step 902 the microprocessor (e.g. microprocessor 716/1016) receives a user's PIN that had been entered by the user (e.g., via touchpad 800). The entered PIN is then compared, at step 904, against a stored PIN (e.g., stored in ROM 822) to determine is a match has occurred.
  • If a match does not occur, an error message or other message indicating an attempted use by other than the authorized user is forwarded at [0064] step 906 to the display. The displayed message (e.g., an error code) might indicate to the user that an error has been detected with an easily discernable message such as “ERR,” or might make such a message recognizable only to the seller, bank or authorization service to better provide an opportunity to recapture a stolen card or detain an unauthorized user.
  • If a match is found at [0065] step 904, the microprocessor increments an activation/transaction counter at step 907 and generates therewith a numeric or alphanumeric security key. The alphanumeric security key is then preferably encrypted at step 908 and forwarded at step 910 to the display. The operator of a card reader 230, or a remote seller communicating with the user, then inputs or forwards at step 912 the displayed, encrypted security key along with the other information found on the surface of the smart card and/or any other required information.
  • Upon receipt of the card information and encrypted key at an authorization service center, an authorization-side activation counter is then incremented at [0066] step 914, thereby remaining synchronized to an activation counter of the smart card. The key is then decrypted at steps 916 in a manner utilizing the incremented activation count to determine at step 918 whether the authorized user initiated the requested purchase authorization. If the activation counter is sufficiently aligned with the counter reading from the card (within an allowed “window” of transaction counter numbers to allow for transactions being processed slightly out of order) and other easily understood criteria are met (i.e., sufficient credit or funds available, no lost or stolen card alert reported), an authorization signal is returned across network 125 at step 920. If any of the new or available criteria are not met, a “transaction rejected” code or signal is returned at step 922.
  • In one embodiment, the smart card uses both a bio-metric reading apparatus and a touchpad for entry of the user's PIN. [0067] Steps 902 and 904, and Steps 302 and 304 are each executed before performing other steps related to production/determination of the encrypted key.
  • FIG. 10 is a diagram of yet another embodiment of the present invention formed in conjunction with an alternative device. In this example alternative embodiment, the present invention is embedded and placed upon an alternative device, a wallet, [0068] 1010. The wallet 1010 preferably has substantially the same shape and form factor as available plastic credit and debit cards such as card 110 in FIG. 1, although it is generally thicker to accommodate the additional components. A smart card, credit card, or other device 1028 may be fitted and held inside the wallet 1010. On the front surface 1012, there is provided a touchpad 1018 for entry of a user's PIN (or alternatively, both a touchpad and bio-metric sensing device). The touchpad and/or bio-metric sensing device is in electrical communication with a microprocessor 1016. A ROM 1022, preferably an EEPROM, stores at least one of the fingerprint or other bio-metric data, the encryption keys, a transaction counter, and a user's PIN, as required to test inputs (either bio-metric or PINs) and produce an encrypted key. A battery 1024 may also be connected to provide power to microprocessor 1016. Again, the power may be provided through movement, solar cells, or other energy sources. The card reader includes a display 1020.
  • Processing performed by the embodiment of FIG. 10 may be performed similarly to any one of the other above described embodiments. The [0069] wallet 1010 includes an IR or other wireless transmitter to automatically transmit the security code to a transaction network. Thus, the present bio-metric reader (“wallet”) may be used with existing smart cards, which lack an incorporated microprocessor and/or display.
  • In yet another embodiment of the present invention, a clocking mechanism [0070] 1100 (see FIG. 7) is coupled to the microprocessor (e.g., microprocessor 716). The clocking mechanism (preferably internal to the smart card, e.g. smart card 710) continually generates a clock authorization number. Programming executed on the microprocessor (e.g., microprocessor 716) uses the clock authorization number in production of the encrypted key. On the Card Authorization Server (CAS) (e.g., CAS 604, back end server, etc.), another clocking mechanism 1150 (See FIG. 6) is synched to the clocking mechanism 1100, and, an output of the synched clocking mechanism 1150 is used to decrypt the encrypted key. The decrypted key is then examined to verify that a proper transaction has been initiated. In one embodiment, the clocking mechanisms are clocks based on current time, and the clock authorization number is a value produced via an algorithm using the time and a clock authorization key. In another embodiment, the clocking mechanisms are unrelated to the current time, but progressively changes values in at least one direction (for example, any combination of count-up, count-down devices, or other time varying devices), and preferably encrypted with the clock authorization key. Use of internal clocks in producing the key, and hence the encrypted key, on both the device (e.g. smart card) and back end (e.g. CAS server) may be utilized in any of the other embodiments discussed further above.
  • The present inventors have realized that the present invention may integrated into existing credit card approval infrastructure. Most credit card approval systems today include a card reader (e.g. reader [0071] 120) which includes a keypad. Software operating the reader generally already has facilities for entry of a PIN, particularly for ATM card transactions that require a PIN. The present invention may be integrated into the existing infrastructure by using the existing software and prompts for collection of ATM PINs for collection and transfer of the encrypted key to a clearing house or other financial institution that approves use of the credit card. Transfer of the encrypted key is performed via a transaction communication in which the encrypted key is passed to the authorizing authority in the PIN field. Other data may also be communicated in the transaction communication.
  • FIG. 11 is a flow chart illustrating an example process flow of implementing data transfer according to an embodiment of the present invention. Initially, at [0072] step 1100, the user swipes a credit card or otherwise enters the credit card number into a card reader, web page, or other device that captures the user's credit card number. At step 1105, the user initiates production of the encrypted key. The encrypted key is initiated according to any of the embodiments discussed above, pressing a button, entering a user PIN, or generated according to another triggering event (e.g., reading the card). Then, at step 1110, the user also enters the encrypted key into the reader when prompted. The prompt may simply be to enter the user's PIN, to which the user responds by entering the encrypted key generated by the smart card (not the user's PIN, which, in the previously discussed embodiments is required for production of the encrypted key). In essence, entry of the encrypted key is entry of the user's PIN for the transaction being processed.
  • The users card number and encrypted key may be entered into the system via other procedures. In one alternative, at [0073] step 1101, the user initiates production of the encrypted key. At step 1106, the user swipes his card into the card reader which then reads both the card number and encrypted key. The alternative procedures may not fit as easily into the existing infrastructures and may require some reprogramming of current readers. However, preferably, in any of the above embodiments, the encrypted key is entered into the system and placed in the existing PIN field of the data transaction between the card reader (e.g. retailer) and the first clearing house in the credit card transaction approval chain.
  • The users card number and encrypted key, along with other necessary information (e.g., cost of transaction, etc.) are then sent via a transaction communication to a clearing house or other financial institution for processing (Step [0074] 1115). A return message from the financial institution/clearing house indicates whether the transaction is approved (i.e., the account is in good standing and the encrypted key matches). If approved, an accept message is sent to the retailer (step 1130), if declined, the disapproval is sent to the retailer (step 1125).
  • FIG. 12A is a block diagram illustrating an example data flow according to an embodiment of the present invention. FIG. 12A presents an example credit card transaction approval chain. In this example, the card number (card #) [0075] 1205 and other transaction data (price, etc) and the encrypted key (preferably placed in the PIN field) 1210 are sent to a primary clearing house. The primary clearing house is the first financial institution in the credit card transaction clearing house chain. The combined fields 1205 and 1210 comprise a transaction communication and may be a single message or multiple messages containing information needed to complete a transaction.
  • The primary clearing house checks the transaction like a normal credit card transaction and passes all the data (e.g. [0076] 1205/1210, now 1225/1230) to a middle clearing house 1240. The middle clearing house 1240 represents all the intermediary financial institutions between the primary clearing house and the banks or backing institution 1260 of the credit card (smart card). The middle clearing house also passes all the data on to the bank 1260. The bank 1260 then checks the account status, decrypts the encrypted key, and sends a status message 1255 back through the credit card transaction approval chain. If the account and key check out ok, the status message is an accept. If not, the status message is a decline.
  • Therefore, the [0077] bank 1260 performs the primary financial and account checking to verify and approve the transaction. However, any of the primary and middle clearing houses may also perform similar functions. If this occurs, then the data flow through the credit card transaction approval chain may be modified accordingly. For example, in FIG. 12B, the middle clearing house 1240 decrypts the encrypted key and checks it for validity. The credit card number is still passed on to the bank 1260 for account validation. In yet another alternative, referring to FIG. 12C, the primary clearing house decrypts the encrypted key and checks it for validity. The credit card number is still passed on to the middle clearing house and bank 1260 for account validation. Any number of variations of checking and approval may be implemented once the card number, other transaction data, and the encrypted key are entered into the data communications representing the transaction to be approved.
  • FIG. 13 is a block diagram illustrating an example data flow and data validation according to an embodiment of the present invention. In this example, a [0078] primary clearing house 1221 receives the card # and other transaction data 1205 and an encrypted key packed in a PIN field. The clearing house sends the card number to an authorization device 1300 that include authorization server 604. The authorization server 604 uses the card number to reference any needed user data 1310, retrieves a clock signal (if needed for the particular embodiment), decrypts the encrypted key, and determines if it is valid. If the decrypted key is valid, and an accept status signal 1235 is received from the subsequent institution (e.g., bank, credit union, etc.), then the clearing house 1221 forward an accept status 1215. If either the decrypted key is invalid, or a decline is received in status 1235, the clearing house forwards a decline in status message 1215.
  • In one embodiment, the smart card of the present invention is produced on an Electronic Ink surface such as a Thin and Flexible Microelectronics (TFM) substrate. Example surfaces are produced by Power Paper™. [0079]
  • The principal components of electronic ink are millions of tiny microcapsules, about the diameter of a human hair. In one incarnation, each microcapsule contains positively charged white particles and negatively charged black particles suspended in a clear fluid. When a negative electric field is applied, the white particles move to the top of the microcapsule where they become visible to the user. This makes the surface appear white at that spot. At the same time, an opposite electric field pulls the black particles to the bottom of the microcapsules where they are hidden. By reversing this process, the black particles appear at the top of the capsule, which now makes the surface appear dark at that spot. To form an E Ink electronic display, the ink is printed onto a sheet of plastic film that is laminated to a layer of circuitry. The circuitry forms a pattern of pixels that can then be controlled by a display driver. These microcapsules are suspended in a liquid “carrier medium” allowing them to be printed using existing screen printing processes onto virtually any surface, including glass, plastic, fabric and even paper. In the present invention, microprocessor [0080] 716 (or other electronics connected thereto) include drivers that charge the electronic circuitry that to form the pattern of pixels for the display on the smart card 710 or smart card wallet 1010. In this embodiment, the LCD display 720, 820, and 1020 is replaced with an electronic ink surface. Any display imaginable may be produced. Some example displays include those presented previously, and alternatives may include those shown in FIGS. 14A and 14B. Each of FIGS. 14A and 14B represent an entire surface of the smart card coated in digital ink. A card number space 1400 is provided. In one embodiment, a logo space 1410 is provided, and programming of the microprocessor and/or display drivers produces a logo of the card or backing financial institution displayed in the logo space 1410. In FIG. 14B, a keypad including digits 1-9, 0, clear, and enter are provided in digital ink. Underlying electronics, including any of heat sensitive, pressure sensitive, or mechanical activation switches are provided to register user inputs on the key pad. Logo space 1430 is a digital ink representation of the credit card company, and expiration date/user information is provided in space 1440.
  • Portions of the present invention may be conveniently implemented using a conventional general purpose or a specialized digital computer or microprocessor programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art. Preferably, that computer is embodied in a microprocessor embedded in a wallet or smart card device. [0081]
  • Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art. The invention may also be implemented by the preparation of application specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art. [0082]
  • The present invention includes a computer program product which is a storage medium (media) having instructions stored thereon/in which can be used to control, or cause, a computer to perform any of the processes of the present invention. The storage medium can include, but is not limited to, any type of disk including floppy disks, mini disks (MD's), optical discs, DVD, CD-ROMS, micro-drive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices (including flash cards), magnetic or optical cards, nanosystems (including molecular memory ICs), RAID devices, remote data storage/archive/warehousing, or any type of media or device suitable for storing instructions and/or data. [0083]
  • Stored on any one of the computer readable medium (media), the present invention includes software for controlling both the hardware of the general purpose/specialized computer or microprocessor, and for enabling the computer or microprocessor to interact with a human user or other mechanism utilizing the results of the present invention. Such software may include, but is not limited to, device drivers, operating systems, and user applications. Ultimately, such computer readable media further includes software for performing the present invention, as described above. [0084]
  • Included in the programming (software) of the general/specialized computer or microprocessor are software modules for implementing the teachings of the present invention, including, but not limited to, retrieval of user inputs including bio-metric data, PIN numbers, PIN number and/or bio-metric data comparisons, operation of counters, encryption/decryption routines, transmitting and receiving any of IR, RF, or other electronic or optical signals, and the display, storage, or communication of results according to the processes of the present invention. [0085]
  • Obviously, numerous modifications and variations of the present invention are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein. [0086]

Claims (36)

What is claimed is:
1. A device for preventing the unauthorized use of proprietary data, the apparatus comprising:
a user authentication device configured to provide the user an authentication data input for proving the user is authorized to use the account number;
a transaction counting mechanism configured to track authorized device access events;
a processor device in electrical communication with the user authenticator and counter, the processor being programmed to generate a security key in response to authentication data received via the user authenticator, the security key being derived at least in part from the contents of the counter; and
a display unit configured to display the security key on the apparatus.
2. The device of claim 1, wherein the security key is derived from the contents of the counter and a user's PIN.
3. The device of claim 2, wherein the security key is encrypted before being displayed.
4. The device of claim 2, further comprising a wireless transmitter to transmit the security key to a network device.
5. The device of claim 4, further comprising a smart card reader, wherein the apparatus can be used with existing smart cards to provide a security key for transactions.
6. The device of claim 2, wherein the apparatus is connected to a computer to authorize transactions on a network.
7. The device of claim 2, wherein the user authenticator is a PIN entry system.
8. The device of claim 1, further comprising a clocking mechanism having an output coupled to the processor device, wherein said processing device also uses the clocking mechanism output to derive the security key.
9. A system for securely processing transactions, the system comprising:
a security key device, comprising,
a user authenticator configured to provide a user an authentication data input for proving the user is authorized to use an account associated with the security device,
a first counter in communication with the user authenticator,
a key generator in communication with the user authenticator and first counter, the key generator being programmed to generate a security key in response to authentication data received via the user authenticator, the security key being derived at least in part from contents of the first counter, and
an electronic display in electrical communication with the key generator, for displaying the security key in a manner visible upon the structure; and
an authorization device, comprising,
a second counter, and
a key confirmation processor programmed to confirm an authenticity of the security key in a manner at least partially dependent upon the contents of the second counter.
10. The system of claim 9, wherein the security key is derived at least partially from the contents of the first counter.
11. The system of claim 9, wherein the security key is derived at least partially from the contents of the first counter and a user PIN.
12. The system of claim 10, wherein the key confirmation processor approves a transaction if the contents of the first counter matches contents of the second counter within a predetermined range.
13. The system of claim 10, wherein the security key is encrypted before being displayed and the key confirmation processor decrypts the key in order to authenticate a transaction.
14. The system according to claim 9, wherein:
the security key device further comprises a first clocking mechanism having an output coupled to the key generator, and the key generator programming includes use of the clocking mechanism output to generate the security key;
the authorization device further comprises a second clocking mechanism synchronized to the first clocking mechanism, and a second counter; and
the key confirmation processor is programmed to confirm an authenticity of the key in a manner at least partially dependent upon the contents of the second counter and an output of the second clocking mechanism.
15. The device according to claim 14, wherein the clocking mechanisms are based on a time variant device.
16. The device according to claim 14, wherein said clocking mechanisms are based on actual time.
17. The device according to claim 9, wherein the authorization device is configured to retrieve the security key from a PIN field of a received transaction communication.
18. A method of securely authorizing a transaction utilizing an account, the method comprising:
confirming an authorized use of an account card via a PIN provided by a user;
maintaining a first count indicative of a number of instances of such authorized uses;
generating a security key in a manner at least partially dependent upon the count;
transmitting the security key to an authorizing authority;
processing the security key at the authorizing authority;
maintaining a second count indicative of a number of transmissions received by the authorizing authority for the account;
confirming that the security key was generated by an authorized user at least in part through use of the second count; and
authorizing the transaction if the security key was generated by an authorized user.
19. The method of claim 18, wherein the PIN is input by a keypad.
20. The method of claim 18, wherein the security key is generated using an encryption algorithm to process a card key and the first count.
21. The method of claim 20, wherein the transaction is authorized if the first count is within a predefined number of the second count.
22. The method of claim 21, wherein the card key is generated from a master key provided by the account provider and from a user's bio-metric data.
23. The method according to claim 21, further comprising the step of:
maintaining first and second clocking devices configured to respectively produce first and second clock signals;
wherein:
said step of generating a security key comprises generating a security key in a manner at least partially dependent upon the count and the first clocking device; and
said step of confirming the security key comprises confirming that the security key was generated by an authorized user at least in part through use of the second count and the second clock signal.
24. The method of claim 18, wherein said step of transmitting the security key comprises transmitting the security key in a PIN field of a transaction communication to the authorizing authority.
25. A smart card, comprising,
an activation device configured to produce a signal in response to a user action;
a display mechanism;
a processing device coupled to the display device and configured to receive said signal; and
programming executed by the processing device, said programming configured to produce an encrypted key and display the encrypted key on the display mechanism.
26. The smart card according to claim 25, wherein:
said smart card comprises a credit card sized enclosure;
said display mechanism is disposed on a face of the credit card sized enclosure; and
said programming is stored on a computer readable media disposed on or within the credit card sized enclosure.
27. The smart card according to claim 26, wherein said credit card sized enclosure in a solid flexible material.
28. The smart card according to claim 26, wherein said activation device is a numeric entry system disposed on a face of the credit card sized enclosure.
29. The smart card according to claim 25, wherein said activation device is a button.
30. The smart card according to claim 25, wherein said activation device is a ten key type entry system and said user action is entry of a PIN .
31. The smart card according to claim 25, wherein:
said programming is further configured to verify said user action prior to displaying the encrypted key; and
if said programming is unable to verify said user action, then, displaying one of an error message and a non-authentic value.
32. The smart card according to claim 25, further comprising:
a bio-metric sensing device coupled to said processing device;
wherein:
said programming is further configured to,
retrieve a bio-metric input from said bio-metric sensing device and compare the bio-metric input to a stored bio-metric value prior to one of calculating and displaying the encrypted key, and
verify said user action prior to displaying the encrypted key prior to one of calculating and displaying the encrypted key; and
if said comparison of the bio-metric input does not match the bio-metric value, or, if the user action is not verified, then, displaying one of an error message and a non-authentic value instead of the encrypted key.
33. The smart card according to claim 32, wherein said bio-metric sensing device is a fingerprint scanner.
34. The smart card according to claim 25, further comprising:
a clocking mechanism configured to produce a time variant clock value;
wherein said programming is further configured to utilize the clock value in producing the encrypted key.
35. The smart card according to claim 34, further comprising:
a transaction counter configured to produce a transaction count based on a number of transactions performed utilizing the smart card;
wherein said programming is further configured to utilize the transaction count in producing the encrypted key.
36. A smart card, comprising,
an activation device configured to produce a signal in response to a user action;
a display mechanism;
a processing device coupled to the display device and configured to receive said signal; and
programming executable by the processing device upon receipt of said signal and configured to produce an encrypted key and display the encrypted key on the display mechanism;
wherein:
said smart card comprises a credit card sized enclosure;
said display mechanism is disposed on a face of the credit card sized enclosure;
said programming is stored on a computer readable media disposed on or within the credit card sized enclosure;
said credit card sized enclosure in a solid flexible material;
said activation device is a numeric entry system disposed on a face of the credit card sized enclosure;
said numeric entry system includes a ten key type entry system and said user action is entry of a PIN via the numeric entry system;
said programming is further configured to verify said user action prior to displaying the encrypted key;
if said programming is unable to verify said user action, then, displaying one of an error message and a non-authentic value on the display mechanism;
said smart card further comprises a bio-metric sensing device coupled to said processing device;
said programming is further configured to retrieve a bio-metric input from said bio-metric sensing device and compare the bio-metric input to a stored bio-metric value prior to one of calculating and displaying the encrypted key,
said bio-metric sensing device is a fingerprint scanner;
said smart card further comprises a transaction counter configured to track authorized transactions associated with the smart card and a clocking mechanism configured to produce a time varying clock value;
said encrypted key is derived, at least in part, based on the transaction counter and time varying clock value; and
said smart card is capable of communicating with an authorization device that,
retrieves the encrypted key from a PIN field of a transaction communication,
decrypts the encrypted key using a count from a second transaction counter and a second time varying clock value from a second clocking mechanism synchronized with the first clocking mechanism, and
authorizes a transaction if the decrypted key is valid;
the decrypted key being valid if produced by the smart card with a valid PIN and the first and second transaction counters are synchronized within a predetermined number of transactions.
US10/040,156 2001-04-26 2001-12-19 Bio-metric smart card, bio-metric smart card reader, and method of use Expired - Fee Related US6954133B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/040,156 US6954133B2 (en) 2001-04-26 2001-12-19 Bio-metric smart card, bio-metric smart card reader, and method of use
PCT/US2002/013262 WO2002088931A1 (en) 2001-04-26 2002-04-26 A bio-metric smart card, bio-metric smart card reader, and method of use

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/843,572 US6816058B2 (en) 2001-04-26 2001-04-26 Bio-metric smart card, bio-metric smart card reader and method of use
US10/040,156 US6954133B2 (en) 2001-04-26 2001-12-19 Bio-metric smart card, bio-metric smart card reader, and method of use

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/843,572 Continuation-In-Part US6816058B2 (en) 2001-04-26 2001-04-26 Bio-metric smart card, bio-metric smart card reader and method of use

Publications (2)

Publication Number Publication Date
US20020180584A1 true US20020180584A1 (en) 2002-12-05
US6954133B2 US6954133B2 (en) 2005-10-11

Family

ID=25290410

Family Applications (3)

Application Number Title Priority Date Filing Date
US09/843,572 Expired - Fee Related US6816058B2 (en) 2001-04-26 2001-04-26 Bio-metric smart card, bio-metric smart card reader and method of use
US10/040,156 Expired - Fee Related US6954133B2 (en) 2001-04-26 2001-12-19 Bio-metric smart card, bio-metric smart card reader, and method of use
US10/940,920 Abandoned US20050029349A1 (en) 2001-04-26 2004-09-14 Bio-metric smart card, bio-metric smart card reader, and method of use

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/843,572 Expired - Fee Related US6816058B2 (en) 2001-04-26 2001-04-26 Bio-metric smart card, bio-metric smart card reader and method of use

Family Applications After (1)

Application Number Title Priority Date Filing Date
US10/940,920 Abandoned US20050029349A1 (en) 2001-04-26 2004-09-14 Bio-metric smart card, bio-metric smart card reader, and method of use

Country Status (4)

Country Link
US (3) US6816058B2 (en)
EP (1) EP1402343A4 (en)
AU (1) AU2008201083A1 (en)
WO (1) WO2002088932A1 (en)

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030222152A1 (en) * 2002-05-28 2003-12-04 Boley George E.S. Pre-paid debit & credit card
US20040010695A1 (en) * 2002-07-09 2004-01-15 Harvinder Sahota System and method for identity verification
US20040034782A1 (en) * 2002-08-11 2004-02-19 Park Jung Woong Card equipped with secret number input keys and the method of activating the same
US20040153417A1 (en) * 2003-02-03 2004-08-05 Mary Everhart Remotely synchronizing financial authentication
US20040188519A1 (en) * 2003-03-31 2004-09-30 Kepler, Ltd. A Hong Kong Corporation Personal biometric authentication and authorization device
US20040230812A1 (en) * 2003-05-16 2004-11-18 Berner Fachhochschule Method for authentication of a user with an authorizing device, and a security apparatus for carrying out the method
US20050029349A1 (en) * 2001-04-26 2005-02-10 Mcgregor Christopher M. Bio-metric smart card, bio-metric smart card reader, and method of use
US20050043997A1 (en) * 2003-08-18 2005-02-24 Sahota Jagdeep Singh Method and system for generating a dynamic verification value
US20050218215A1 (en) * 2004-04-02 2005-10-06 Lauden Gary A Biometric identification system
US20050240528A1 (en) * 2004-04-23 2005-10-27 Colin Hendrick Smartcard with visual display
US20050269402A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
US20050269401A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
US20060065741A1 (en) * 2004-09-29 2006-03-30 Vayssiere Julien J Multi-application smartcard
US20060131406A1 (en) * 2004-12-17 2006-06-22 Cato Robert T System and method of data entry utilizing a scanning printer
US20060186209A1 (en) * 2005-02-22 2006-08-24 Tyfone, Inc. Electronic transaction card
US20060213970A1 (en) * 2003-05-08 2006-09-28 Koninklijke Philips Electronics N.C. Smart authenticating card
US20060226217A1 (en) * 2005-04-07 2006-10-12 Tyfone, Inc. Sleeve for electronic transaction card
US20060292946A1 (en) * 2005-06-22 2006-12-28 Perfect Plastic Printing Corporation Financial Transaction Card With Embedded Fabric
US20070005685A1 (en) * 2002-09-16 2007-01-04 Wunchun Chau Browser-based payment system
US20070016798A1 (en) * 2005-07-15 2007-01-18 Narendra Siva G Asymmetric cryptography with user authentication
US20070014407A1 (en) * 2005-07-15 2007-01-18 Tyfone, Inc. Symmetric cryptography with user authentication
US20070014408A1 (en) * 2005-07-15 2007-01-18 Tyfone, Inc. Hybrid symmetric/asymmetric cryptography with user authentication
US7212279B1 (en) * 2002-05-20 2007-05-01 Magna Chip Semiconductor Ltd. Biometric identity verifiers and methods
US20070299783A1 (en) * 2001-07-10 2007-12-27 American Express Travel Related Services Company, Inc. System and method for proffering multiple biometrics for use with a fob
US20080008359A1 (en) * 2001-07-10 2008-01-10 American Express Travel Related Services Company, Inc. System for biometric security using a fob
US20080037842A1 (en) * 2003-05-08 2008-02-14 Srinivas Gutta Smart Card That Stores Invisible Signatures
US20080065553A1 (en) * 2006-06-19 2008-03-13 Patrick Faith Verification Error Reduction System
US20080199053A1 (en) * 2007-02-15 2008-08-21 Tariq Zafar Method for consolidating various financial type cards into a single card and providing positive identification of an individual using such card
US20080308629A1 (en) * 2005-02-26 2008-12-18 James Roskind Time-varying security code for enabling authorizations and other uses of financial accounts
US20090013180A1 (en) * 2005-08-12 2009-01-08 Dongsheng Li Method and Apparatus for Ensuring the Security of an Electronic Certificate Tool
US20090070592A1 (en) * 2007-09-07 2009-03-12 Authentec, Inc. Finger sensing apparatus using encrypted user template and associated methods
US20090159703A1 (en) * 2007-12-24 2009-06-25 Dynamics Inc. Credit, security, debit cards and the like with buttons
US20090299918A1 (en) * 2008-05-28 2009-12-03 Nigelpower, Llc Wireless delivery of power to a mobile powered device
US20090313168A1 (en) * 2008-06-16 2009-12-17 Visa U.S.A. Inc. System and Method for Authorizing Financial Transactions with Online Merchants
US20090319784A1 (en) * 2008-06-24 2009-12-24 Patrick Faith Dynamic verification value system and method
US20100097180A1 (en) * 2008-10-21 2010-04-22 Cardullo Mario W System and method for credit card user identification verification
US20100140359A1 (en) * 2008-12-02 2010-06-10 Em Microelectronic-Marin S.A. Electronic card having control means
US7740168B2 (en) 2003-08-18 2010-06-22 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US20100163616A1 (en) * 2008-12-29 2010-07-01 Simon Phillips Methods and apparatus for use in association with identification token
US20100235249A1 (en) * 2003-11-14 2010-09-16 E2Interactive, Inc. D/B/A E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US20100250957A1 (en) * 2005-09-09 2010-09-30 University Of South Florida Method of Authenticating a User on a Network
US7961101B2 (en) 2008-08-08 2011-06-14 Tyfone, Inc. Small RFID card with integrated inductive element
US20110153441A1 (en) * 2009-12-23 2011-06-23 Merrill Brooks Smith Systems and Methods for Authorizing Use of Validly Sold Merchandise
US7991158B2 (en) 2006-12-13 2011-08-02 Tyfone, Inc. Secure messaging
US20110239000A1 (en) * 2010-03-29 2011-09-29 Serotta Paul Andrew Password-protected physical transfer of password-protected devices
US20110246372A1 (en) * 2010-04-01 2011-10-06 Merchant Link, Llc System and method for point-to-point encryption with adjunct terminal
US20110284633A1 (en) * 2008-11-28 2011-11-24 Gemalto Sa Portable object including a display and application for carrying out electronic transactions
US8181879B2 (en) * 2006-12-29 2012-05-22 Solicore, Inc. Mailing apparatus for powered cards
US20120130903A1 (en) * 2002-02-05 2012-05-24 Jack Dorsey Back end of payment system associated with financial transactions using card readers coupled to mobile devices
US8231061B2 (en) 2009-02-24 2012-07-31 Tyfone, Inc Contactless device with miniaturized antenna
US8451122B2 (en) 2008-08-08 2013-05-28 Tyfone, Inc. Smartcard performance enhancement circuits and systems
US8629576B2 (en) 2008-03-28 2014-01-14 Qualcomm Incorporated Tuning and gain control in electro-magnetic power systems
US8671454B2 (en) 2010-11-04 2014-03-11 Verifone, Inc. System for secure web-prompt processing on point of sale devices
US20140239068A1 (en) * 2013-02-22 2014-08-28 John Chowhan Park Credit card with alterable id/security features
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
US9124120B2 (en) 2007-06-11 2015-09-01 Qualcomm Incorporated Wireless power system and proximity effects
US9130602B2 (en) 2006-01-18 2015-09-08 Qualcomm Incorporated Method and apparatus for delivering energy to an electrical or electronic device via a wireless link
US20150332257A1 (en) * 2012-01-30 2015-11-19 Rahamim Karakop Safe card
US20160364730A1 (en) * 2015-06-09 2016-12-15 Mastercard International Incorporated Systems and Methods for Verifying Users, in Connection With Transactions Using Payment Devices
US9582795B2 (en) 2002-02-05 2017-02-28 Square, Inc. Methods of transmitting information from efficient encryption card readers to mobile devices
US9691066B2 (en) 2012-07-03 2017-06-27 Verifone, Inc. Location-based payment system and method
US9741027B2 (en) 2007-12-14 2017-08-22 Tyfone, Inc. Memory card based contactless devices
US9774086B2 (en) 2007-03-02 2017-09-26 Qualcomm Incorporated Wireless power apparatus and methods
EP3364352A1 (en) * 2017-02-21 2018-08-22 Mastercard International Incorporated Determining legitimate conditions at a computing device
CN108596605A (en) * 2013-02-06 2018-09-28 天地融科技股份有限公司 Smart card with electronic signature functionality
US10410216B2 (en) 2014-04-29 2019-09-10 Mastercard International Incorporated Methods and systems for verifying individuals prior to benefits distribution
US10846677B2 (en) 2019-01-11 2020-11-24 Merchant Link, Llc System and method for secure detokenization
US10936928B2 (en) * 2017-10-31 2021-03-02 University Of Florida Research Foundation, Incorporated Payment card overlay skimmer detection
US10949520B2 (en) * 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US11481774B2 (en) * 2007-09-26 2022-10-25 Clevx, Llc Security aspects of a self-authenticating credit card
US20220374907A1 (en) * 2021-05-18 2022-11-24 Samsung Electronics Co., Ltd. Ic card including registered biometric information and registered pin information, operation method thereof, and operation method of card reader communicating with ic card

Families Citing this family (117)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6924781B1 (en) 1998-09-11 2005-08-02 Visible Tech-Knowledgy, Inc. Smart electronic label employing electronic ink
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7953671B2 (en) 1999-08-31 2011-05-31 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7505941B2 (en) * 1999-08-31 2009-03-17 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions using biometrics
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US8380628B1 (en) * 2000-07-17 2013-02-19 Harris Intellectual Property, Lp System and method for verifying commercial transactions
US20070228144A1 (en) * 2000-08-01 2007-10-04 Lee Knackstedt Processing transactions using a register portion to track transactions
EP1253500A1 (en) * 2001-04-26 2002-10-30 Nokia Corporation Method and device for authenticating a user on a remote server
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US8284025B2 (en) 2001-07-10 2012-10-09 Xatra Fund Mx, Llc Method and system for auditory recognition biometrics on a FOB
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7249112B2 (en) 2002-07-09 2007-07-24 American Express Travel Related Services Company, Inc. System and method for assigning a funding source for a radio frequency identification device
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US20040236699A1 (en) 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US8489063B2 (en) 2001-10-24 2013-07-16 Sipco, Llc Systems and methods for providing emergency messages to a mobile device
US20060118621A1 (en) * 2001-11-19 2006-06-08 Burchette Robert L Jr Transaction card system having security against unauthorized usage
CN1643844A (en) * 2002-01-29 2005-07-20 Ip和创新控股有限公司 System and method of authenticating a transaction
US7627143B1 (en) * 2002-04-19 2009-12-01 At&T Intellectual Property I, L.P. Real-time remote image capture system
FR2842631A1 (en) * 2002-07-19 2004-01-23 Grp Des Cartes Bancaires METHOD FOR RECORDING IN A CHIP CARD AND CHIP CARD FOR CARRYING OUT THIS METHOD
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
GB2408235B (en) * 2002-12-20 2005-09-21 Motorola Inc Secure smartcard system and method of operation
US7385508B1 (en) * 2003-03-07 2008-06-10 Coleman Ray Non-rigid card holder with display
US7165056B2 (en) * 2003-07-25 2007-01-16 Lenovo Singapore Pte, Ltd Administering devices in dependence upon user metric vectors including relational metrics and location based device control
US20050077348A1 (en) * 2003-08-11 2005-04-14 Colin Hendrick Intelligent ID card holder
US20050035200A1 (en) * 2003-08-11 2005-02-17 Colin Hendrick Secure smartcard sleeve
JP2007524151A (en) * 2003-09-26 2007-08-23 マスターカード インターナシヨナル インコーポレーテツド Method and system for enabling proximity devices with biometrics
US20070100754A1 (en) * 2003-12-17 2007-05-03 Brown Kerry D Financial transaction network security
US7641124B2 (en) * 2003-12-17 2010-01-05 Qsecure, Inc. Magnetic data recording device
US7543739B2 (en) 2003-12-17 2009-06-09 Qsecure, Inc. Automated payment card fraud detection and location
US20050154671A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporation Systems and methods for mitigating identity theft associated with use of credit and debit cards
US20050194454A1 (en) * 2004-02-06 2005-09-08 T-Ink, Llc Personal card system featuring integrated circuit
AT413775B (en) * 2004-03-31 2006-05-15 Helmut Dipl Ing Schluderbacher PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM
GB2430785B (en) * 2004-07-01 2008-06-25 American Express Travel Relate System for biometric security using a smartcard
US20060016868A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a smartcard
US7341181B2 (en) * 2004-07-01 2008-03-11 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US7185806B2 (en) * 2004-08-12 2007-03-06 Sines Randy D Financial and similar identification cards read by magnetic swipe card readers and methods relating thereto
JP2006134145A (en) * 2004-11-08 2006-05-25 Seiko Epson Corp Ic card
US7290713B2 (en) 2005-01-18 2007-11-06 Target Brands, Inc. Stored-value card with sound and light
US7216803B2 (en) 2005-01-21 2007-05-15 Kingsley Chukwudum Nwosu Biometric delegation and authentication of financial transactions
CN101120354B (en) * 2005-02-17 2010-06-09 皇家飞利浦电子股份有限公司 A device and a method of operating a device
US20080308627A1 (en) * 2005-04-07 2008-12-18 Sines Randy D Financial and similar identification cards and methods relating thereto including awards
US7482925B2 (en) * 2005-06-24 2009-01-27 Visa U.S.A. Apparatus and method to electromagnetically shield portable consumer devices
TWI328193B (en) * 2005-07-04 2010-08-01 Ind Tech Res Inst Display-card electronic device
GB0513767D0 (en) * 2005-07-05 2005-08-10 Knowles Christopher A method of and a system for authentication
US20070007334A1 (en) * 2005-07-08 2007-01-11 Wong Jim B Mini ATM/credit card, mini bank ID card and mini key/access card
US7210621B2 (en) * 2005-09-13 2007-05-01 Woronec John S Secure credit card and method and apparatus for utilizing the same
US8090945B2 (en) * 2005-09-16 2012-01-03 Tara Chand Singhal Systems and methods for multi-factor remote user authentication
US20070073619A1 (en) * 2005-09-23 2007-03-29 Smith Rebecca C Biometric anti-fraud plastic card
US20070112981A1 (en) * 2005-11-15 2007-05-17 Motorola, Inc. Secure USB storage device
US20070124810A1 (en) * 2005-11-29 2007-05-31 Sigalow Ian D Method and system for securing electronic transactions
US20070181670A1 (en) * 2006-02-08 2007-08-09 American Express Travel Related Services Company, Inc. System, method and computer program product for POS-based capture of reference magnetic signatures
TWM298197U (en) * 2006-03-27 2006-09-21 Shi-Ming Jeng Electronic card with fingerprint recognition function
US7316357B2 (en) * 2006-04-14 2008-01-08 Target Brands, Inc. Stored-value card with bubble wand
WO2007143740A2 (en) * 2006-06-08 2007-12-13 Mastercard International Incorporated All-in-one proximity payment device with local authentication
JP2010506245A (en) * 2006-06-08 2010-02-25 アムラム ペレド Computer-based credit card
CN101485128B (en) * 2006-06-19 2016-08-03 维萨美国股份有限公司 Portable consumer device verification system
WO2007149830A2 (en) * 2006-06-19 2007-12-27 Visa U.S.A. Inc. Portable consumer device configured to generate dynamic authentication data
US20080040615A1 (en) * 2006-06-30 2008-02-14 Electronic Plastics, Llc Biometric embedded device
AU2009200408B2 (en) 2006-09-12 2012-05-10 Cpc Patent Technologies Pty Ltd Password generator
WO2008031143A1 (en) * 2006-09-12 2008-03-20 Microlatch Pty Ltd Password generator
KR100875952B1 (en) * 2006-09-22 2008-12-26 소프트픽셀(주) Electronic card and its manufacturing method
US20080097924A1 (en) * 2006-10-20 2008-04-24 Electronic Plastics, Llc Decentralized secure transaction system
WO2008066623A2 (en) 2006-10-20 2008-06-05 Biometric Lingerie, Inc. Biometric garment and method of operation
US10111481B2 (en) 2006-10-20 2018-10-30 Biometric Lingerie, Inc. Signal-activated lingerie
US20080265017A1 (en) * 2006-10-24 2008-10-30 West Sammie J Credit card and security system
US7967214B2 (en) 2006-12-29 2011-06-28 Solicore, Inc. Card configured to receive separate battery
KR100909364B1 (en) * 2007-02-06 2009-07-24 삼성전자주식회사 Memory controller and method of blocking system clock exposure
US20080244208A1 (en) * 2007-03-30 2008-10-02 Narendra Siva G Memory card hidden command protocol
US7959076B1 (en) * 2007-04-26 2011-06-14 United Services Automobile Association (Usaa) Secure card
US8109436B1 (en) 2007-04-26 2012-02-07 United Services Automobile Association (Usaa) Secure card
US7784685B1 (en) 2007-04-26 2010-08-31 United Services Automobile Association (Usaa) Secure card
US8604995B2 (en) * 2007-06-11 2013-12-10 Visa U.S.A. Inc. Shielding of portable consumer device
EP2168282A1 (en) 2007-07-12 2010-03-31 Innovation Investments, LLC Identity authentication and secured access systems, components, and methods
US8820638B1 (en) * 2007-07-27 2014-09-02 United Services Automobile Association (Usaa) System and methods related to an available balance debit/credit card
US7979088B2 (en) * 2007-08-13 2011-07-12 International Business Machines Corporation Water friend or foe system for global vessel identification and tracking
TW200915235A (en) * 2007-09-26 2009-04-01 Clevx Llc Self-authenticating credit card system
US7871013B2 (en) * 2007-10-31 2011-01-18 Target Brands, Inc. Transaction product with electrical circuit
US8038068B2 (en) 2007-11-28 2011-10-18 Visa U.S.A. Inc. Multifunction removable cover for portable payment device
US20090159679A1 (en) * 2007-12-20 2009-06-25 Mastercard International, Inc. Ultra Low-Power User Authentication Device for Financial Transactions
US20100287083A1 (en) * 2007-12-28 2010-11-11 Mastercard International, Inc. Detecting modifications to financial terminals
US20090204539A1 (en) * 2008-02-13 2009-08-13 Andre Parker Portable Electronic Financial Management
US7966664B2 (en) * 2008-06-03 2011-06-21 Hewlett-Packard Development Company, L.P. Error and exception message handling framework
US20100033310A1 (en) * 2008-08-08 2010-02-11 Narendra Siva G Power negotation for small rfid card
US7896247B2 (en) * 2008-12-01 2011-03-01 Research In Motion Limited Secure use of externally stored data
US8941466B2 (en) * 2009-01-05 2015-01-27 Polytechnic Institute Of New York University User authentication for devices with touch sensitive elements, such as touch sensitive display screens
JP5809562B2 (en) * 2009-01-07 2015-11-11 パワード カード ソリューションズ、リミティッド ライアビリティ カンパニー Display of data from the secure chip on the card
US8234507B2 (en) 2009-01-13 2012-07-31 Metrologic Instruments, Inc. Electronic-ink display device employing a power switching mechanism automatically responsive to predefined states of device configuration
US8457013B2 (en) 2009-01-13 2013-06-04 Metrologic Instruments, Inc. Wireless dual-function network device dynamically switching and reconfiguring from a wireless network router state of operation into a wireless network coordinator state of operation in a wireless communication network
JP2011023854A (en) * 2009-07-14 2011-02-03 Sony Corp Information processing apparatus, information processing method, and program
US8387869B2 (en) * 2009-12-24 2013-03-05 International Business Machines Corporation Protecting electronic cards
US9508068B2 (en) * 2009-12-31 2016-11-29 First Data Corporation Systems and methods for processing a contactless transaction card
GB2476987B (en) * 2010-01-19 2013-11-27 Haim Cohen Transaction card with improved security features
US8870065B2 (en) * 2010-03-16 2014-10-28 Sherry Brennan Multi-use electronic card balance reader
US8628021B2 (en) 2010-07-29 2014-01-14 Craig L. Jones Debit/credit card device
US8875998B2 (en) 2012-07-23 2014-11-04 Sherry Brennan Middle class america card
US10395227B2 (en) 2015-01-14 2019-08-27 Tactilis Pte. Limited System and method for reconciling electronic transaction records for enhanced security
US10037528B2 (en) 2015-01-14 2018-07-31 Tactilis Sdn Bhd Biometric device utilizing finger sequence for authentication
US9607189B2 (en) 2015-01-14 2017-03-28 Tactilis Sdn Bhd Smart card system comprising a card and a carrier
US10817935B1 (en) * 2015-07-02 2020-10-27 Jpmorgan Chase Bank, N.A. System and method for increasing credit worthiness of account holders
CN106373288A (en) * 2016-11-03 2017-02-01 深圳市亚略特生物识别科技有限公司 Certificate handling self-service terminal
CN106447941A (en) * 2016-11-03 2017-02-22 深圳市亚略特生物识别科技有限公司 Self-service certificate handling equipment
US10452908B1 (en) * 2016-12-23 2019-10-22 Wells Fargo Bank, N.A. Document fraud detection
US10984304B2 (en) 2017-02-02 2021-04-20 Jonny B. Vu Methods for placing an EMV chip onto a metal card
WO2019204903A1 (en) * 2018-04-27 2019-10-31 Dass Neal Fingerprint recognition for pos terminal system
USD956760S1 (en) * 2018-07-30 2022-07-05 Lion Credit Card Inc. Multi EMV chip card
US10873585B2 (en) 2018-08-20 2020-12-22 Bank Of America Corporation System for detecting unauthorized access via card characteristic verification
US11281788B2 (en) * 2019-07-01 2022-03-22 Bank Of America Corporation Transient pliant encryption with indicative nano display cards
US11132592B1 (en) * 2020-05-01 2021-09-28 Capital One Services, Llc Transaction card including replaceable chip insert
US11030509B1 (en) * 2020-06-24 2021-06-08 Capital One Services, Llc Biodegradable payment card with embedded plant seeds

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4614861A (en) * 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
US5686904A (en) * 1991-05-29 1997-11-11 Microchip Technology Incorporated Secure self learning system
US5748737A (en) * 1994-11-14 1998-05-05 Daggar; Robert N. Multimedia electronic wallet with generic card
US5774065A (en) * 1994-08-05 1998-06-30 Nippondenso Co., Ltd. Remote control system and method using variable ID code
US6136771A (en) * 1999-06-23 2000-10-24 The Dial Corporation Compositions containing a high percent saturation concentration of antibacterial agent
US6547130B1 (en) * 1999-06-03 2003-04-15 Ming-Shiang Shen Integrated circuit card with fingerprint verification capability

Family Cites Families (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4438824A (en) * 1981-04-22 1984-03-27 Siemens Corporation Apparatus and method for cryptographic identity verification
JPS6228868A (en) * 1985-07-31 1987-02-06 Casio Comput Co Ltd Ic card system
JPH07121630B2 (en) * 1987-05-30 1995-12-25 株式会社東芝 IC card
US4879747A (en) * 1988-03-21 1989-11-07 Leighton Frank T Method and system for personal identification
US5317636A (en) * 1992-12-09 1994-05-31 Arris, Inc. Method and apparatus for securing credit card transactions
US5623552A (en) * 1994-01-21 1997-04-22 Cardguard International, Inc. Self-authenticating identification card with fingerprint identification
US6269348B1 (en) * 1994-11-28 2001-07-31 Veristar Corporation Tokenless biometric electronic debit and credit transactions
US5857079A (en) * 1994-12-23 1999-01-05 Lucent Technologies Inc. Smart card for automatic financial records
US5815252A (en) * 1995-09-05 1998-09-29 Canon Kabushiki Kaisha Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives
US5790668A (en) * 1995-12-19 1998-08-04 Mytec Technologies Inc. Method and apparatus for securely handling data in a database of biometrics and associated data
US5809142A (en) * 1996-08-14 1998-09-15 Texas Instruments Incorporated Method and system for calculating a user account balance in a recognition system
US5770849A (en) * 1996-08-23 1998-06-23 Motorola, Inc. Smart card device with pager and visual image display
US6745936B1 (en) * 1996-08-23 2004-06-08 Orion Systems, Inc. Method and apparatus for generating secure endorsed transactions
US6012636A (en) * 1997-04-22 2000-01-11 Smith; Frank E. Multiple card data system having first and second memory elements including magnetic strip and fingerprints scanning means
US5903225A (en) * 1997-05-16 1999-05-11 Harris Corporation Access control system including fingerprint sensor enrollment and associated methods
US5920640A (en) * 1997-05-16 1999-07-06 Harris Corporation Fingerprint sensor and token reader and associated methods
US6098330A (en) * 1997-05-16 2000-08-08 Authentec, Inc. Machine including vibration and shock resistant fingerprint sensor and related methods
US6163771A (en) 1997-08-28 2000-12-19 Walker Digital, Llc Method and device for generating a single-use financial account number
GB2329497B (en) * 1997-09-19 2001-01-31 Ibm Method for controlling access to electronically provided services and system for implementing such method
US6266647B1 (en) * 1997-11-03 2001-07-24 Xtec, Incorporated Methods and apparatus for electronically storing and retrieving value information on a portable card
US6016963A (en) * 1998-01-23 2000-01-25 Mondex International Limited Integrated circuit card with means for performing risk management
US6193163B1 (en) * 1998-08-31 2001-02-27 The Standard Register Company Smart card with replaceable chip
DE19860177C2 (en) * 1998-12-24 2002-11-21 Ibm Method and device for the user-controlled activation of chip card functions
US6507912B1 (en) * 1999-01-27 2003-01-14 International Business Machines Corporation Protection of biometric data via key-dependent sampling
WO2000062214A1 (en) * 1999-04-08 2000-10-19 Cleartogo.Com Credit card security technique
US6957337B1 (en) * 1999-08-11 2005-10-18 International Business Machines Corporation Method and apparatus for secure authorization and identification using biometrics without privacy invasion
US6715679B1 (en) * 1999-09-08 2004-04-06 At&T Corp. Universal magnetic stripe card
AU4607801A (en) * 1999-10-28 2001-05-08 Brivo Systems, Inc. System and method for providing access to an unattended storage device
US6806807B2 (en) * 2000-06-30 2004-10-19 Jordan Cayne Intelligent locking system
US6631849B2 (en) * 2000-12-06 2003-10-14 Bank One, Delaware, National Association Selectable multi-purpose card
JP2004524605A (en) * 2000-12-14 2004-08-12 クィジッド テクノロジーズ リミテッド Authentication system
US6959874B2 (en) * 2001-02-23 2005-11-01 Bardwell William E Biometric identification system using biometric images and personal identification number stored on a magnetic stripe and associated methods
FR2823049B1 (en) * 2001-03-29 2003-06-06 Nextream Sa METHOD AND DEVICE FOR CONTROLLING THE QUALITY OF VIDEO DATA
US20020153424A1 (en) * 2001-04-19 2002-10-24 Chuan Li Method and apparatus of secure credit card transaction
US6816058B2 (en) * 2001-04-26 2004-11-09 Mcgregor Christopher M Bio-metric smart card, bio-metric smart card reader and method of use
US20030074317A1 (en) * 2001-10-15 2003-04-17 Eyal Hofi Device, method and system for authorizing transactions
US20060095369A1 (en) * 2001-10-15 2006-05-04 Eyal Hofi Device, method and system for authorizing transactions
US6854642B2 (en) * 2001-10-19 2005-02-15 Chesterfield Holdings, L.L.C. System for vending products and services using an identification card and associated methods
US6991155B2 (en) * 2001-11-19 2006-01-31 Laser Card, Llc Transaction card system having security against unauthorized usage
US20030145203A1 (en) * 2002-01-30 2003-07-31 Yves Audebert System and method for performing mutual authentications between security tokens
AU2002232187A1 (en) * 2002-02-14 2003-09-04 Shimada, Kennichi Authenticating method
US7155416B2 (en) * 2002-07-03 2006-12-26 Tri-D Systems, Inc. Biometric based authentication system with random generated PIN
US20040050930A1 (en) * 2002-09-17 2004-03-18 Bernard Rowe Smart card with onboard authentication facility
US6776332B2 (en) * 2002-12-26 2004-08-17 Micropin Technologies Inc. System and method for validating and operating an access card
US7281244B2 (en) * 2003-01-16 2007-10-09 Sun Microsystems, Inc. Using a digital fingerprint to commit loaded data in a device
CN1764923A (en) * 2003-01-21 2006-04-26 Para3公司 Card settlement method using portable electronic equipment with fingerprint sensor
US6983882B2 (en) * 2003-03-31 2006-01-10 Kepler, Ltd. Personal biometric authentication and authorization device
US20050188213A1 (en) * 2004-02-23 2005-08-25 Xiaoshu Xu System for personal identity verification
JP4622334B2 (en) * 2004-06-23 2011-02-02 日本電気株式会社 Content data utilization system and method, mobile communication terminal and program
EP1677537A1 (en) * 2004-12-31 2006-07-05 Swisscom Mobile AG Method and device for receiving content data with conditional access and Remote Server
US20060224508A1 (en) * 2005-04-05 2006-10-05 Fietz Guy D Online debit cardless debit transaction system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4614861A (en) * 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
US5686904A (en) * 1991-05-29 1997-11-11 Microchip Technology Incorporated Secure self learning system
US5774065A (en) * 1994-08-05 1998-06-30 Nippondenso Co., Ltd. Remote control system and method using variable ID code
US5748737A (en) * 1994-11-14 1998-05-05 Daggar; Robert N. Multimedia electronic wallet with generic card
US6547130B1 (en) * 1999-06-03 2003-04-15 Ming-Shiang Shen Integrated circuit card with fingerprint verification capability
US6136771A (en) * 1999-06-23 2000-10-24 The Dial Corporation Compositions containing a high percent saturation concentration of antibacterial agent

Cited By (174)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050029349A1 (en) * 2001-04-26 2005-02-10 Mcgregor Christopher M. Bio-metric smart card, bio-metric smart card reader, and method of use
US7506819B2 (en) * 2001-07-10 2009-03-24 Xatra Fund Mx, Llc Biometric security using a fob
US20070299783A1 (en) * 2001-07-10 2007-12-27 American Express Travel Related Services Company, Inc. System and method for proffering multiple biometrics for use with a fob
US20080008359A1 (en) * 2001-07-10 2008-01-10 American Express Travel Related Services Company, Inc. System for biometric security using a fob
US7500616B2 (en) * 2001-07-10 2009-03-10 Xatra Fund Mx, Llc Authenticating fingerprints for radio frequency payment transactions
US7506818B2 (en) * 2001-07-10 2009-03-24 Xatra Fund Mx, Llc Biometrics for radio frequency payment transactions
US9582795B2 (en) 2002-02-05 2017-02-28 Square, Inc. Methods of transmitting information from efficient encryption card readers to mobile devices
US9916581B2 (en) * 2002-02-05 2018-03-13 Square, Inc. Back end of payment system associated with financial transactions using card readers coupled to mobile devices
US20120130903A1 (en) * 2002-02-05 2012-05-24 Jack Dorsey Back end of payment system associated with financial transactions using card readers coupled to mobile devices
US7212279B1 (en) * 2002-05-20 2007-05-01 Magna Chip Semiconductor Ltd. Biometric identity verifiers and methods
US20030222152A1 (en) * 2002-05-28 2003-12-04 Boley George E.S. Pre-paid debit & credit card
US20090077646A1 (en) * 2002-07-09 2009-03-19 Harvinder Sahota System and method for identity verification
US7765588B2 (en) 2002-07-09 2010-07-27 Harvinder Sahota System and method for identity verification
US7454784B2 (en) * 2002-07-09 2008-11-18 Harvinder Sahota System and method for identity verification
US20040010695A1 (en) * 2002-07-09 2004-01-15 Harvinder Sahota System and method for identity verification
US20040034782A1 (en) * 2002-08-11 2004-02-19 Park Jung Woong Card equipped with secret number input keys and the method of activating the same
US20070005685A1 (en) * 2002-09-16 2007-01-04 Wunchun Chau Browser-based payment system
US20040153417A1 (en) * 2003-02-03 2004-08-05 Mary Everhart Remotely synchronizing financial authentication
US6983882B2 (en) 2003-03-31 2006-01-10 Kepler, Ltd. Personal biometric authentication and authorization device
US20040188519A1 (en) * 2003-03-31 2004-09-30 Kepler, Ltd. A Hong Kong Corporation Personal biometric authentication and authorization device
US20060213970A1 (en) * 2003-05-08 2006-09-28 Koninklijke Philips Electronics N.C. Smart authenticating card
US20080037842A1 (en) * 2003-05-08 2008-02-14 Srinivas Gutta Smart Card That Stores Invisible Signatures
US20040230812A1 (en) * 2003-05-16 2004-11-18 Berner Fachhochschule Method for authentication of a user with an authorizing device, and a security apparatus for carrying out the method
US8387866B2 (en) 2003-08-18 2013-03-05 Visa International Service Association Method and system for generating a dynamic verification value
US8423415B2 (en) 2003-08-18 2013-04-16 Visa International Service Association Payment service authentication for a transaction using a generated dynamic verification value
US20050043997A1 (en) * 2003-08-18 2005-02-24 Sahota Jagdeep Singh Method and system for generating a dynamic verification value
US7740168B2 (en) 2003-08-18 2010-06-22 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US8636205B2 (en) 2003-08-18 2014-01-28 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US8087582B2 (en) 2003-08-18 2012-01-03 Ayman Hammad Method and system for generating a dynamic verification value
US10528951B2 (en) 2003-08-18 2020-01-07 Visa International Service Association Payment service authentication for a transaction using a generated dynamic verification value
US7761374B2 (en) * 2003-08-18 2010-07-20 Visa International Service Association Method and system for generating a dynamic verification value
US20100262546A1 (en) * 2003-08-18 2010-10-14 Jagdeep Singh Sahota Payment service authentication for a transaction using a generated dynamic verification value
US20100252623A1 (en) * 2003-08-18 2010-10-07 Ayman Hammad Method and system for generating a dynamic verification value
US20100235249A1 (en) * 2003-11-14 2010-09-16 E2Interactive, Inc. D/B/A E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US8655309B2 (en) 2003-11-14 2014-02-18 E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US20050218215A1 (en) * 2004-04-02 2005-10-06 Lauden Gary A Biometric identification system
WO2006031255A2 (en) * 2004-04-02 2006-03-23 Riptide Systems, Inc. Biometric identification system
WO2006031255A3 (en) * 2004-04-02 2006-05-26 Riptide Systems Inc Biometric identification system
US7172115B2 (en) * 2004-04-02 2007-02-06 Riptide Systems, Inc. Biometric identification system
US20050240528A1 (en) * 2004-04-23 2005-10-27 Colin Hendrick Smartcard with visual display
US20050269401A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
US20050269402A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
US20060065741A1 (en) * 2004-09-29 2006-03-30 Vayssiere Julien J Multi-application smartcard
US7270276B2 (en) * 2004-09-29 2007-09-18 Sap Ag Multi-application smartcard
US20060131406A1 (en) * 2004-12-17 2006-06-22 Cato Robert T System and method of data entry utilizing a scanning printer
US7204408B2 (en) 2004-12-17 2007-04-17 International Business Machines Corporation System and method of data entry utilizing a scanning printer
US7954716B2 (en) 2005-02-22 2011-06-07 Tyfone, Inc. Electronic transaction card powered by mobile device
US8091786B2 (en) 2005-02-22 2012-01-10 Tyfone, Inc. Add-on card with smartcard circuitry powered by a mobile device
US8408463B2 (en) 2005-02-22 2013-04-02 Tyfone, Inc. Mobile device add-on apparatus for financial transactions
US7954717B2 (en) 2005-02-22 2011-06-07 Tyfone, Inc. Provisioning electronic transaction card in mobile device
US7581678B2 (en) 2005-02-22 2009-09-01 Tyfone, Inc. Electronic transaction card
US11720777B2 (en) 2005-02-22 2023-08-08 Icashe, Inc. Mobile phone with magnetic card emulation
US9092708B1 (en) 2005-02-22 2015-07-28 Tyfone, Inc. Wearable device with time-varying magnetic field
US9004361B2 (en) 2005-02-22 2015-04-14 Tyfone, Inc. Wearable device transaction system
US11436461B2 (en) 2005-02-22 2022-09-06 Kepler Computing Inc. Mobile phone with magnetic card emulation
US8474718B2 (en) 2005-02-22 2013-07-02 Tyfone, Inc. Method for provisioning an apparatus connected contactless to a mobile device
US7954715B2 (en) 2005-02-22 2011-06-07 Tyfone, Inc. Mobile device with transaction card in add-on slot
US20060186209A1 (en) * 2005-02-22 2006-08-24 Tyfone, Inc. Electronic transaction card
US11270174B2 (en) 2005-02-22 2022-03-08 Icashe, Inc. Mobile phone with magnetic card emulation
US8573494B2 (en) 2005-02-22 2013-11-05 Tyfone, Inc. Apparatus for secure financial transactions
US20090298540A1 (en) * 2005-02-22 2009-12-03 Tyfone, Inc. Electronic transaction card
US9208423B1 (en) 2005-02-22 2015-12-08 Tyfone, Inc. Mobile device with time-varying magnetic field and single transaction account numbers
US8136732B2 (en) 2005-02-22 2012-03-20 Tyfone, Inc. Electronic transaction card with contactless interface
US7828214B2 (en) 2005-02-22 2010-11-09 Tyfone, Inc. Mobile phone with electronic transaction card
US9202156B2 (en) 2005-02-22 2015-12-01 Tyfone, Inc. Mobile device with time-varying magnetic field
US9251453B1 (en) 2005-02-22 2016-02-02 Tyfone, Inc. Wearable device with time-varying magnetic field and single transaction account numbers
US8083145B2 (en) 2005-02-22 2011-12-27 Tyfone, Inc. Provisioning an add-on apparatus with smartcard circuity for enabling transactions
US10185909B2 (en) 2005-02-22 2019-01-22 Tyfone, Inc. Wearable device with current carrying conductor to produce time-varying magnetic field
US9715649B2 (en) 2005-02-22 2017-07-25 Tyfone, Inc. Device with current carrying conductor to produce time-varying magnetic field
US10803370B2 (en) 2005-02-22 2020-10-13 Tyfone, Inc. Provisioning wearable device with current carrying conductor to produce time-varying magnetic field
US9626611B2 (en) 2005-02-22 2017-04-18 Tyfone, Inc. Provisioning mobile device with time-varying magnetic field
US8820637B1 (en) * 2005-02-26 2014-09-02 James A. Roskind Time-varying security code for enabling authorizations and other uses of financial accounts
US7798416B2 (en) 2005-02-26 2010-09-21 James Roskind Time-varying security code for enabling authorizations and other uses of financial accounts
US20160125406A1 (en) * 2005-02-26 2016-05-05 James A. Roskind Time-varying security code for enabling authorizations and other uses of financial accounts
US20080308629A1 (en) * 2005-02-26 2008-12-18 James Roskind Time-varying security code for enabling authorizations and other uses of financial accounts
US9262761B2 (en) 2005-02-26 2016-02-16 James A. Roskind Time-varying security code for enabling authorizations and other uses of financial accounts
US20060226217A1 (en) * 2005-04-07 2006-10-12 Tyfone, Inc. Sleeve for electronic transaction card
US20080093467A1 (en) * 2005-04-07 2008-04-24 Tyfone, Inc. Folding electronic transaction card
US20060292946A1 (en) * 2005-06-22 2006-12-28 Perfect Plastic Printing Corporation Financial Transaction Card With Embedded Fabric
US8189788B2 (en) 2005-07-15 2012-05-29 Tyfone, Inc. Hybrid symmetric/asymmetric cryptography with user authentication
US20070014407A1 (en) * 2005-07-15 2007-01-18 Tyfone, Inc. Symmetric cryptography with user authentication
US20070014408A1 (en) * 2005-07-15 2007-01-18 Tyfone, Inc. Hybrid symmetric/asymmetric cryptography with user authentication
US7805615B2 (en) 2005-07-15 2010-09-28 Tyfone, Inc. Asymmetric cryptography with user authentication
US20070016798A1 (en) * 2005-07-15 2007-01-18 Narendra Siva G Asymmetric cryptography with user authentication
US8477940B2 (en) 2005-07-15 2013-07-02 Tyfone, Inc. Symmetric cryptography with user authentication
US20090013180A1 (en) * 2005-08-12 2009-01-08 Dongsheng Li Method and Apparatus for Ensuring the Security of an Electronic Certificate Tool
US20100250957A1 (en) * 2005-09-09 2010-09-30 University Of South Florida Method of Authenticating a User on a Network
US8127142B2 (en) * 2005-09-09 2012-02-28 University Of South Florida Method of authenticating a user on a network
US9130602B2 (en) 2006-01-18 2015-09-08 Qualcomm Incorporated Method and apparatus for delivering energy to an electrical or electronic device via a wireless link
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
US11107069B2 (en) 2006-06-19 2021-08-31 Visa U.S.A. Inc. Transaction authentication using network
US11783326B2 (en) 2006-06-19 2023-10-10 Visa U.S.A. Inc. Transaction authentication using network
US20080065553A1 (en) * 2006-06-19 2008-03-13 Patrick Faith Verification Error Reduction System
KR101364210B1 (en) * 2006-06-19 2014-02-14 비자 유에스에이 인코포레이티드 Verification error reduction system
KR101456551B1 (en) 2006-06-19 2014-10-31 비자 유에스에이 인코포레이티드 Track data encryption
US7991158B2 (en) 2006-12-13 2011-08-02 Tyfone, Inc. Secure messaging
US8181879B2 (en) * 2006-12-29 2012-05-22 Solicore, Inc. Mailing apparatus for powered cards
US20080199053A1 (en) * 2007-02-15 2008-08-21 Tariq Zafar Method for consolidating various financial type cards into a single card and providing positive identification of an individual using such card
US9774086B2 (en) 2007-03-02 2017-09-26 Qualcomm Incorporated Wireless power apparatus and methods
US9124120B2 (en) 2007-06-11 2015-09-01 Qualcomm Incorporated Wireless power system and proximity effects
US20090070592A1 (en) * 2007-09-07 2009-03-12 Authentec, Inc. Finger sensing apparatus using encrypted user template and associated methods
US8145916B2 (en) * 2007-09-07 2012-03-27 Authentec, Inc. Finger sensing apparatus using encrypted user template and associated methods
US11481774B2 (en) * 2007-09-26 2022-10-25 Clevx, Llc Security aspects of a self-authenticating credit card
US9741027B2 (en) 2007-12-14 2017-08-22 Tyfone, Inc. Memory card based contactless devices
US9727813B2 (en) 2007-12-24 2017-08-08 Dynamics Inc. Credit, security, debit cards and the like with buttons
US10169692B2 (en) 2007-12-24 2019-01-01 Dynamics Inc. Credit, security, debit cards and the like with buttons
US20090159703A1 (en) * 2007-12-24 2009-06-25 Dynamics Inc. Credit, security, debit cards and the like with buttons
US8629576B2 (en) 2008-03-28 2014-01-14 Qualcomm Incorporated Tuning and gain control in electro-magnetic power systems
US20090299918A1 (en) * 2008-05-28 2009-12-03 Nigelpower, Llc Wireless delivery of power to a mobile powered device
US20090313168A1 (en) * 2008-06-16 2009-12-17 Visa U.S.A. Inc. System and Method for Authorizing Financial Transactions with Online Merchants
US10803692B2 (en) * 2008-06-16 2020-10-13 Visa U.S.A. Inc. System and method for authorizing financial transactions with online merchants
US10008067B2 (en) * 2008-06-16 2018-06-26 Visa U.S.A. Inc. System and method for authorizing financial transactions with online merchants
US8954353B2 (en) 2008-06-24 2015-02-10 Visa U.S.A. Inc. Mobile phone including dynamic verification value
US8898089B2 (en) 2008-06-24 2014-11-25 Visa U.S.A. Inc. Dynamic verification value system and method
US20090319784A1 (en) * 2008-06-24 2009-12-24 Patrick Faith Dynamic verification value system and method
WO2010008768A2 (en) * 2008-06-24 2010-01-21 Visa U.S.A . Inc . Dynamic verification value system and method
WO2010008768A3 (en) * 2008-06-24 2011-03-10 Visa U.S.A . Inc . Dynamic verification value system and method
US9489608B2 (en) 2008-08-08 2016-11-08 Tyfone, Inc. Amplifier and transmission solution for 13.56MHz radio coupled to smartmx smartcard controller
US9483722B2 (en) 2008-08-08 2016-11-01 Tyfone, Inc. Amplifier and transmission solution for 13.56MHz radio coupled to smartcard controller
US9904887B2 (en) 2008-08-08 2018-02-27 Tyfone, Inc. Computing device with NFC and active load modulation
US8410936B2 (en) 2008-08-08 2013-04-02 Tyfone, Inc. Contactless card that receives power from host device
US9122965B2 (en) 2008-08-08 2015-09-01 Tyfone, Inc. 13.56 MHz enhancement circuit for smartcard controller
US8451122B2 (en) 2008-08-08 2013-05-28 Tyfone, Inc. Smartcard performance enhancement circuits and systems
US9117152B2 (en) 2008-08-08 2015-08-25 Tyfone, Inc. 13.56 MHz enhancement circuit for smartmx smartcard controller
US8937549B2 (en) 2008-08-08 2015-01-20 Tyfone, Inc. Enhanced integrated circuit with smartcard controller
US8866614B2 (en) 2008-08-08 2014-10-21 Tyfone, Inc. Active circuit for RFID
US10318855B2 (en) 2008-08-08 2019-06-11 Tyfone, Inc. Computing device with NFC and active load modulation for mass transit ticketing
US9390359B2 (en) 2008-08-08 2016-07-12 Tyfone, Inc. Mobile device with a contactless smartcard device and active load modulation
US8072331B2 (en) 2008-08-08 2011-12-06 Tyfone, Inc. Mobile payment device
US11694053B2 (en) 2008-08-08 2023-07-04 Icashe, Inc. Method and apparatus for transmitting data via NFC for mobile applications including mobile payments and ticketing
US10607129B2 (en) 2008-08-08 2020-03-31 Tyfone, Inc. Sideband generating NFC apparatus to mimic load modulation
US8814053B2 (en) 2008-08-08 2014-08-26 Tyfone, Inc. Mobile payment device with small inductive device powered by a host device
US7961101B2 (en) 2008-08-08 2011-06-14 Tyfone, Inc. Small RFID card with integrated inductive element
US10949726B2 (en) 2008-08-08 2021-03-16 Icashe, Inc. Mobile phone with NFC apparatus that does not rely on power derived from an interrogating RF field
WO2010048182A1 (en) * 2008-10-21 2010-04-29 Cardullo Mario W System and method for credit card user identification verification
US20100097180A1 (en) * 2008-10-21 2010-04-22 Cardullo Mario W System and method for credit card user identification verification
US20110284633A1 (en) * 2008-11-28 2011-11-24 Gemalto Sa Portable object including a display and application for carrying out electronic transactions
US9202330B2 (en) * 2008-11-28 2015-12-01 Gemalto Sa Portable object including a display and application for carrying out electronic transactions
US20100140359A1 (en) * 2008-12-02 2010-06-10 Em Microelectronic-Marin S.A. Electronic card having control means
TWI455032B (en) * 2008-12-02 2014-10-01 Em Microelectronic Marin Sa Electronic card having control means
US8381992B2 (en) * 2008-12-02 2013-02-26 Em Microelectronic-Marin Sa Electronic card having control means
US8794532B2 (en) * 2008-12-29 2014-08-05 Mastercard International Incorporated Methods and apparatus for use in association with identification token
US20100163616A1 (en) * 2008-12-29 2010-07-01 Simon Phillips Methods and apparatus for use in association with identification token
US8231061B2 (en) 2009-02-24 2012-07-31 Tyfone, Inc Contactless device with miniaturized antenna
US20110153441A1 (en) * 2009-12-23 2011-06-23 Merrill Brooks Smith Systems and Methods for Authorizing Use of Validly Sold Merchandise
US9141929B2 (en) 2010-03-29 2015-09-22 Verifone, Inc. Password-protected physical transfer of password-protected devices
US9635020B2 (en) 2010-03-29 2017-04-25 Verifone, Inc. Password-protected physical transfer of password-protected devices
US20110239000A1 (en) * 2010-03-29 2011-09-29 Serotta Paul Andrew Password-protected physical transfer of password-protected devices
US8533484B2 (en) 2010-03-29 2013-09-10 Verifone, Inc. Password-protected physical transfer of password-protected devices
US8346671B2 (en) * 2010-04-01 2013-01-01 Merchant Link, Llc System and method for point-to-point encryption with adjunct terminal
US20110246372A1 (en) * 2010-04-01 2011-10-06 Merchant Link, Llc System and method for point-to-point encryption with adjunct terminal
US8671454B2 (en) 2010-11-04 2014-03-11 Verifone, Inc. System for secure web-prompt processing on point of sale devices
US9208489B2 (en) 2010-11-04 2015-12-08 Verifone, Inc. System for secure web-prompt processing on point sale devices
US20150332257A1 (en) * 2012-01-30 2015-11-19 Rahamim Karakop Safe card
US10915892B2 (en) * 2012-01-30 2021-02-09 Rahamim Karakop Safe card
US9691066B2 (en) 2012-07-03 2017-06-27 Verifone, Inc. Location-based payment system and method
CN108596605A (en) * 2013-02-06 2018-09-28 天地融科技股份有限公司 Smart card with electronic signature functionality
US20140239068A1 (en) * 2013-02-22 2014-08-28 John Chowhan Park Credit card with alterable id/security features
US10410216B2 (en) 2014-04-29 2019-09-10 Mastercard International Incorporated Methods and systems for verifying individuals prior to benefits distribution
US11132684B2 (en) 2014-04-29 2021-09-28 Mastercard International Incorporated Methods and systems for verifying individuals prior to benefits distribution
US11645655B2 (en) 2014-04-29 2023-05-09 Mastercard International Incorporated Methods and systems for verifying individuals prior to benefits distribution
US20210049613A1 (en) * 2015-06-09 2021-02-18 Mastercard International Incorporated Systems and methods for verifying users, in connection with transactions using payment devices
US10817878B2 (en) * 2015-06-09 2020-10-27 Mastercard International Incorporated Systems and methods for verifying users, in connection with transactions using payment devices
US20160364730A1 (en) * 2015-06-09 2016-12-15 Mastercard International Incorporated Systems and Methods for Verifying Users, in Connection With Transactions Using Payment Devices
US11568412B2 (en) * 2015-06-09 2023-01-31 Mastercard International Incorporated Systems and methods for verifying users, in connection with transactions using payment devices
US20230119751A1 (en) * 2015-06-09 2023-04-20 Mastercard International Incorporated Systems and methods for verifying users, in connection with transactions using payment devices
EP3364352A1 (en) * 2017-02-21 2018-08-22 Mastercard International Incorporated Determining legitimate conditions at a computing device
CN110326011A (en) * 2017-02-21 2019-10-11 万事达卡国际公司 Determine the lawful condition calculated at equipment
WO2018156384A1 (en) * 2017-02-21 2018-08-30 Mastercard International Incorporated Determining legitimate conditions at a computing device
US10936928B2 (en) * 2017-10-31 2021-03-02 University Of Florida Research Foundation, Incorporated Payment card overlay skimmer detection
US10949520B2 (en) * 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US10846677B2 (en) 2019-01-11 2020-11-24 Merchant Link, Llc System and method for secure detokenization
US11875328B2 (en) 2019-01-11 2024-01-16 Merchant Link, Llc System and method for secure detokenization
US20220374907A1 (en) * 2021-05-18 2022-11-24 Samsung Electronics Co., Ltd. Ic card including registered biometric information and registered pin information, operation method thereof, and operation method of card reader communicating with ic card

Also Published As

Publication number Publication date
EP1402343A1 (en) 2004-03-31
US20050029349A1 (en) 2005-02-10
AU2008201083A1 (en) 2008-04-03
EP1402343A4 (en) 2006-04-19
US6954133B2 (en) 2005-10-11
US20020158747A1 (en) 2002-10-31
WO2002088932A1 (en) 2002-11-07
US6816058B2 (en) 2004-11-09

Similar Documents

Publication Publication Date Title
US6954133B2 (en) Bio-metric smart card, bio-metric smart card reader, and method of use
US6662166B2 (en) Tokenless biometric electronic debit and credit transactions
US4357529A (en) Multilevel security apparatus and method
EP0385400B1 (en) Multilevel security apparatus and method with personal key
US6983882B2 (en) Personal biometric authentication and authorization device
US7536352B2 (en) Tokenless biometric electronic financial transactions via a third party identicator
US6192142B1 (en) Tokenless biometric electronic stored value transactions
US6581042B2 (en) Tokenless biometric electronic check transactions
US8201747B2 (en) Auto-sequencing financial payment display card
US4304990A (en) Multilevel security apparatus and method
US5892211A (en) Transaction system comprising a first transportable integrated circuit device, a terminal, and a security device
US5163098A (en) System for preventing fraudulent use of credit card
US20100123002A1 (en) Card printing verification system
US20100123003A1 (en) Method for verifying instant card issuance
WO2000067187A9 (en) Tokenless biometric electronic rewards system
CA2817431A1 (en) System and method for requesting and processing pin data using a digit subset for subsequent pin authentication
WO2002088931A1 (en) A bio-metric smart card, bio-metric smart card reader, and method of use
AU2002308486A1 (en) A bio-metric smart card, bio-metric smart card reader, and method of use

Legal Events

Date Code Title Description
AS Assignment

Owner name: MCGREGOR, CHRISTOPHER M., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AUDLEM LTD.;REEL/FRAME:015296/0930

Effective date: 20031121

Owner name: MCGREGOR, TRAVIS M., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AUDLEM LTD.;REEL/FRAME:015296/0930

Effective date: 20031121

Owner name: MCGREGOR, D. SCOTT, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AUDLEM LTD.;REEL/FRAME:015296/0930

Effective date: 20031121

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 8

SULP Surcharge for late payment

Year of fee payment: 7

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.)

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20171011